Cargando…
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was prev...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
University Library System, University of Pittsburgh
2011
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4296799/ https://www.ncbi.nlm.nih.gov/pubmed/25945177 http://dx.doi.org/10.5195/ijt.2011.6070 |
_version_ | 1782353042978373632 |
---|---|
author | Watzlaf, Valerie J.M. Moeini, Sohrab Matusow, Laura Firouzan, Patti |
author_facet | Watzlaf, Valerie J.M. Moeini, Sohrab Matusow, Laura Firouzan, Patti |
author_sort | Watzlaf, Valerie J.M. |
collection | PubMed |
description | In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. |
format | Online Article Text |
id | pubmed-4296799 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2011 |
publisher | University Library System, University of Pittsburgh |
record_format | MEDLINE/PubMed |
spelling | pubmed-42967992015-05-05 VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II Watzlaf, Valerie J.M. Moeini, Sohrab Matusow, Laura Firouzan, Patti Int J Telerehabil Technology Review In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. University Library System, University of Pittsburgh 2011-05-24 /pmc/articles/PMC4296799/ /pubmed/25945177 http://dx.doi.org/10.5195/ijt.2011.6070 Text en This work is licensed by the author(s) under a Creative Commons Attribution 3.0 United States License. |
spellingShingle | Technology Review Watzlaf, Valerie J.M. Moeini, Sohrab Matusow, Laura Firouzan, Patti VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title | VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title_full | VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title_fullStr | VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title_full_unstemmed | VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title_short | VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II |
title_sort | voip for telerehabilitation: a risk analysis for privacy, security and hipaa compliance: part ii |
topic | Technology Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4296799/ https://www.ncbi.nlm.nih.gov/pubmed/25945177 http://dx.doi.org/10.5195/ijt.2011.6070 |
work_keys_str_mv | AT watzlafvaleriejm voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii AT moeinisohrab voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii AT matusowlaura voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii AT firouzanpatti voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii |