Cargando…

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was prev...

Descripción completa

Detalles Bibliográficos
Autores principales: Watzlaf, Valerie J.M., Moeini, Sohrab, Matusow, Laura, Firouzan, Patti
Formato: Online Artículo Texto
Lenguaje:English
Publicado: University Library System, University of Pittsburgh 2011
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4296799/
https://www.ncbi.nlm.nih.gov/pubmed/25945177
http://dx.doi.org/10.5195/ijt.2011.6070
_version_ 1782353042978373632
author Watzlaf, Valerie J.M.
Moeini, Sohrab
Matusow, Laura
Firouzan, Patti
author_facet Watzlaf, Valerie J.M.
Moeini, Sohrab
Matusow, Laura
Firouzan, Patti
author_sort Watzlaf, Valerie J.M.
collection PubMed
description In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.
format Online
Article
Text
id pubmed-4296799
institution National Center for Biotechnology Information
language English
publishDate 2011
publisher University Library System, University of Pittsburgh
record_format MEDLINE/PubMed
spelling pubmed-42967992015-05-05 VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II Watzlaf, Valerie J.M. Moeini, Sohrab Matusow, Laura Firouzan, Patti Int J Telerehabil Technology Review In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR. University Library System, University of Pittsburgh 2011-05-24 /pmc/articles/PMC4296799/ /pubmed/25945177 http://dx.doi.org/10.5195/ijt.2011.6070 Text en This work is licensed by the author(s) under a Creative Commons Attribution 3.0 United States License.
spellingShingle Technology Review
Watzlaf, Valerie J.M.
Moeini, Sohrab
Matusow, Laura
Firouzan, Patti
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title_full VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title_fullStr VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title_full_unstemmed VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title_short VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
title_sort voip for telerehabilitation: a risk analysis for privacy, security and hipaa compliance: part ii
topic Technology Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4296799/
https://www.ncbi.nlm.nih.gov/pubmed/25945177
http://dx.doi.org/10.5195/ijt.2011.6070
work_keys_str_mv AT watzlafvaleriejm voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii
AT moeinisohrab voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii
AT matusowlaura voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii
AT firouzanpatti voipfortelerehabilitationariskanalysisforprivacysecurityandhipaacompliancepartii