{"title":"PoPI Compliance through Access Control of Electronic Health Records","authors":"Tamir Tsegaye, Stephen Flowerday","doi":"10.1145/3351108.3351130","DOIUrl":null,"url":null,"abstract":"The electronic health record (EHR) has revolutionised the manner in which healthcare is delivered by providing clinicians with electronic access to patients' complete medical history. Countries such as South Africa aim to take advantage of the EHR by implementing a national EHR system. While this has a number of benefits that are in the best interests of the patient, it also creates security and privacy risks to patients' information. Patient information has been identified as the most sensitive type of personal information. Unlike other types of personal information, it contains confidential information about the patient that cannot be changed such as the patient's medical history. Thus, the EHR needs to be protected from both unauthorised entities and misuse by authorised clinicians. This can be achieved through the regulation of the national EHR system. Although regulations state that personal information must be protected, they do not specify what processes must be followed in order to comply with them. This paper proposes a model to address this problem by indicating the components that are needed in order to assist compliance. The proposed model, which was informed by a scoping review and thematic analysis, is discussed in the context of South Africa's future national EHR system with the focus on the Protection of Personal Information (PoPI) Act.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3351108.3351130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The electronic health record (EHR) has revolutionised the manner in which healthcare is delivered by providing clinicians with electronic access to patients' complete medical history. Countries such as South Africa aim to take advantage of the EHR by implementing a national EHR system. While this has a number of benefits that are in the best interests of the patient, it also creates security and privacy risks to patients' information. Patient information has been identified as the most sensitive type of personal information. Unlike other types of personal information, it contains confidential information about the patient that cannot be changed such as the patient's medical history. Thus, the EHR needs to be protected from both unauthorised entities and misuse by authorised clinicians. This can be achieved through the regulation of the national EHR system. Although regulations state that personal information must be protected, they do not specify what processes must be followed in order to comply with them. This paper proposes a model to address this problem by indicating the components that are needed in order to assist compliance. The proposed model, which was informed by a scoping review and thematic analysis, is discussed in the context of South Africa's future national EHR system with the focus on the Protection of Personal Information (PoPI) Act.