Hi Kiran
It depends a lot on the context of course. I don't have a huge
experience securing patient record systems or with HIPAA, but there
are some principles which are broadly applicable:
1. You must have a high level executive summary 1-pager laying out
the information security policy for the clinic. Would refer to any
existing legislation, existing standard operating procedures etc,
would motivate the need for information security (principles) and it
would indicate what technical framework if any that the clinic is
going to work towards. Such a document shouldn't be more than 1 page
(so it is easily displayed and people can read it). All the other
processes relating to backups, encryption, access control etc would
derive from this. It should be signed by the highest authority
possible to sign it to indicate top management support. Generally
such a document wouldn't originate at the clinic level, but in the
absence of other guidance it is possible.
2. There should be some named individual responsible for the
implementation of policy (inf security officer/ISO). Once security
management gets into a rhythm this person should ideally be
maintaining a risk register (spreadsheet is fine) outlining risks
which have been identified (no offsite backups, unconfigured ssl,
users sharing passwords, no NDA for consultants/volunteers etc etc),
prioritising them and addressing them systematically. Maintaining a
managed security environment is an ongoing job, with new risks always
being identified. Someone must have the job of identifying, listing
and addressing them in accordance to the principles of 1 above, In a
small scale environment it might be better to think of this as a role
rather than a (whole) person.
3. Awareness and dissemination. No point having a security policy if
nobody knows about it. There are lots of strategies can be used here.
The prominent 1 pager helps. Linking with HR induction processes of
starting (and finishing) employment etc.
I think the above 3 principles are sufficiently generic to be broadly
applicable for compliance to any security management framework.
Probably there are enough people on this list with significant openmrs
and other clinical systems to make a start on a risk register of
common risks encountered in the field, perhaps particularly with an
eye to HIPAA, which would help kick start the work of the ISO.
Similalrly, I imagine there is the makings of a relatively generic
executive summary template to help clinics get started to be had from
the vast and historic openmrs implementers experience.
Note that government clinics should be informed by public service
regulations (though often these don't exist or are hard to find or
lack relevance) and NGOs working with ICTs should be operating their
own security management system along the lines of above (but
frequently don't). In the absence of these supports, it is more
reason to make a plan than less reason. Plans should be simple and
address real rather than imaginary challenges. That's much more
important than being highly polished and superficially "professional".
Hope that gives you some actionable ideas.
Regards
Bob
> email to
dev+uns...@openmrs.org.