Alliance Outlines Need For Smart Card-Based Healthcare Identity Management Infrastructure Leveraging Existing Federal Standards

Government policy makers and healthcare stakeholders looking to establish electronic medical records (EMRs) to improve the U.S. healthcare system should look first to defining the identity management infrastructure for securely identifying patients, medical providers and anyone else handling the records, stated the Smart Card Alliance Healthcare and Identity Councils in a position paper issued recently. To this end, the Councils recommend the use of existing federal standards for smart cards to create a trusted identity management infrastructure.

The passing of the American Recovery and Reinvestment Act of 2009 (ARRA) and HITECH Act gave impetus for the Smart Card Alliance to create the paper to elevate the discussion about identity management before the federal government begins to invest over $19 billion in healthcare information technology. This investment will provide significant incentives for healthcare providers to implement EMR systems over the next five years. The Alliance argues that these plans that emphasize electronic health record exchange are putting the cart before the horse, and effective identity management is needed first.

“As we move away from paper-based medical records that are controlled by physical access to buildings, rooms, and files, we need to have a healthcare infrastructure that supports strong identity and security controls,” said Paul Contino, chair of the Smart Card Alliance Healthcare Council and vice president of information technology with Mount Sinai Medical Center “The issues with establishing identity are compounded as electronic medical records are used by many different organizations at the regional, state, and national levels. There must be a way to uniquely and securely authenticate each person across the healthcare infrastructure, whether that interaction is in person or over the Internet.”

The Smart Card Alliance paper discusses the current challenges facing the healthcare IT infrastructure and details why smart cards provide the most cost efficient, secure, and user-accepted method for solving the healthcare identity management problem. It also explains how smart card technology can help make the critical capabilities needed in the healthcare infrastructure both possible and cost-effective. It can also provide an ideal way to achieve HIPAA compliance and meet the more stringent regulatory requirements of ARRA / HITECH.

“The lack of consistent and uniform identity management is at the root of the challenges faced by the healthcare industry today -- lowering administrative costs, preventing medical identity theft and fraud, protecting patient privacy, and enabling healthcare data exchanges. In fact, of the 195,000 deaths in the United States that occur annually due to medical errors, 60 percent of those were because of failure to correctly identify the patient,” said Randy Vanderhoof, executive director of the Smart Card Alliance. “Creating a healthcare identity management infrastructure based on smart card technology directly addresses these problems because it enables the ability to properly identify patients and healthcare providers, match healthcare records, and identify individuals and healthcare providers that have authorized access to them.”

In addition to the use of smart cards, the Healthcare and Identity Councils advise the healthcare industry to take the opportunity to leverage and build upon existing federal initiatives and standards, such as the NIST Federal Information Processing Standard (FIPS) 201 and the Personal Identity Verification (PIV) card, which are already in use by numerous government agencies. These existing standards are proven technology solutions and an established set of best practices for smart card-based identity management and authentication that can be adapted to healthcare.

“NIST standards, and the Federal Identity, Credential, and Access Management (F/ICAM) committee vision and framework on identity management provide the foundation for the healthcare industry to jump-start the definition of a national healthcare identity management infrastructure and provide a proven model for interoperability across multiple organizations,” Vanderhoof said

Featured

  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West
  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.