Research Article
BibTex RIS Cite
Year 2024, , 20 - 24, 30.04.2024
https://doi.org/10.48121/jihsam.1355992

Abstract

References

  • European Union, Directive 95/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. (1995). Available at: https://www.refworld.org/docid/3ddcc1c74.html Accessed 16 May 2023.
  • Das, R., Baykara, M., & Tuna, G. (2017). Cryptolog: A new approach to provide log security for digital forensics. IU-Journal of Electrical & Electronics Engineering, 17(2), 3453-3462.
  • Gostin, L. O., Levit, L. A., & Nass, S. J. (Eds.). (2009). Beyond the HIPAA privacy rule: enhancing privacy, improving health through research.
  • Isleyen, F., & Ulgu, M. M. (2020). Data Transfer Model for HIS and Developers Opinions in Turkey. In Digital Personalized Health and Medicine (pp. 557-561). IOS Press.
  • Li, G., Hart, A. ve Gregory, J., (1998). Flocculation and sedimentation of high turbidity water, Water Resources, 25, 9, 1137-1143.
  • ISO. (2013). ISO/IEC 27001:2013(en) Information technology — Security techniques — Information security management systems — Requirements. Last accessed: 09 28, 2022 https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en.
  • Kişisel Verilerin Korunması Kanunu (2016). Resmi Gazete (Sayı: 29677) https://www.mevzuat.gov.tr/mevzuat?MevzuatNo=6698&MevzuatTur=1&MevzuatTertip=5. Accessed on 23rd Jan 2022.
  • Kişisel Sağlık Verileri Hakkında Yönetmelik. (2019). Resmi Gazete (Sayı: 30808) https://www.resmigazete.gov.tr/eskiler/2019/06/20190621-3.htm Accessed on 23rd Jan 2022.
  • Krueger, R.A. & Casey, M.A. (2015) Focus Groups: A Practical Guide for Applied Research. 5th Ed. Thousand Oakes: Sage Publications.
  • Kuo, K. M., Talley, P. C., & Lin, D. Y. M. (2021). Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables. INQUIRY: The Journal of Health Care Organization, Provision, and Financing, 58, 00469580211029599.
  • Malin, B., & Airoldi, E. (2007). Confidentiality preserving audits of electronic medical record access. Studies in health technology and informatics, 129(1), 320.
  • Moore, I. N., Snyder, S. L., Miller, C., Qui An, A., Blackford, J. U., Zhou, C., & Hickson, G. B. (2007). Confidentiality and Privacy in Health Care from the Patient's Perspective: Does HIPPA Help?. Health Matrix, 17, 215.
  • Oh, S. R., Seo, Y. D., Lee, E., & Kim, Y. G. (2021). A comprehensive survey on security and privacy for electronic health data. International Journal of Environmental Research and Public Health, 18(18), 9668.
  • Ross, R. S. (2018). Risk management framework for information systems and organizations: A system life cycle approach for security and privacy.
  • Sameera V, Bindra A, Rath GP. Human errors and their prevention in healthcare. J Anaesthesiol Clin Pharmacol. 2021 Jul-Sep;37(3):328-335. doi: 10.4103/joacp.JOACP_364_19. Epub 2021 Oct 12. PMID: 34759539; PMCID: PMC8562433.
  • Tariq, R. A., & Hackert, P. B. (2018). Patient confidentiality. Available from: https://www.ncbi.nlm.nih.gov/books/NBK519540/

A National Minimum Health Log Standard; SAMILOG

Year 2024, , 20 - 24, 30.04.2024
https://doi.org/10.48121/jihsam.1355992

Abstract

Aim: Health data is considered highly sensitive, and the protection of health data is an ethical and legal responsibility. Healthcare organizations use various security measures and techniques to adopt a secure electronic health records system, including keeping log data. HIS developers kept the log records according to their needs by making the necessary coding for the "change-delete" triggers. Therefore, the need to develop a common standard for keeping diaries in health information systems was felt. This standard was considered a guide for software developers. This standard was named SAMILOG (Minimum Log Standards in Health). In this study, the development process of SAMILOG is explained. Method: Focus group meetings were held with seven developer companies. Several scenarios of unauthorized access or data breaches in a health information system were created. The participants discussed each scenario and evaluated the best methods for keeping logs and which data should kept log in each case. Previously, a standard called VEM was developed to assist data migration, when HIS software of a hospital changes. The data field names of VEM standard were also used in this new standard. Results: In SAMILOG 1.0, it was defined which of the data elements in each VEM set should be logged, it required an update for SAMILOG as the VEM was updated. Conclusion: SAMILOG v1.0 was announced in 2016. In case of a security breach related to the past in the health data of public hospitals in Turkey, primarily the data logged within the scope of SAMILOG are examined.

References

  • European Union, Directive 95/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. (1995). Available at: https://www.refworld.org/docid/3ddcc1c74.html Accessed 16 May 2023.
  • Das, R., Baykara, M., & Tuna, G. (2017). Cryptolog: A new approach to provide log security for digital forensics. IU-Journal of Electrical & Electronics Engineering, 17(2), 3453-3462.
  • Gostin, L. O., Levit, L. A., & Nass, S. J. (Eds.). (2009). Beyond the HIPAA privacy rule: enhancing privacy, improving health through research.
  • Isleyen, F., & Ulgu, M. M. (2020). Data Transfer Model for HIS and Developers Opinions in Turkey. In Digital Personalized Health and Medicine (pp. 557-561). IOS Press.
  • Li, G., Hart, A. ve Gregory, J., (1998). Flocculation and sedimentation of high turbidity water, Water Resources, 25, 9, 1137-1143.
  • ISO. (2013). ISO/IEC 27001:2013(en) Information technology — Security techniques — Information security management systems — Requirements. Last accessed: 09 28, 2022 https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en.
  • Kişisel Verilerin Korunması Kanunu (2016). Resmi Gazete (Sayı: 29677) https://www.mevzuat.gov.tr/mevzuat?MevzuatNo=6698&MevzuatTur=1&MevzuatTertip=5. Accessed on 23rd Jan 2022.
  • Kişisel Sağlık Verileri Hakkında Yönetmelik. (2019). Resmi Gazete (Sayı: 30808) https://www.resmigazete.gov.tr/eskiler/2019/06/20190621-3.htm Accessed on 23rd Jan 2022.
  • Krueger, R.A. & Casey, M.A. (2015) Focus Groups: A Practical Guide for Applied Research. 5th Ed. Thousand Oakes: Sage Publications.
  • Kuo, K. M., Talley, P. C., & Lin, D. Y. M. (2021). Hospital Staff’s Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables. INQUIRY: The Journal of Health Care Organization, Provision, and Financing, 58, 00469580211029599.
  • Malin, B., & Airoldi, E. (2007). Confidentiality preserving audits of electronic medical record access. Studies in health technology and informatics, 129(1), 320.
  • Moore, I. N., Snyder, S. L., Miller, C., Qui An, A., Blackford, J. U., Zhou, C., & Hickson, G. B. (2007). Confidentiality and Privacy in Health Care from the Patient's Perspective: Does HIPPA Help?. Health Matrix, 17, 215.
  • Oh, S. R., Seo, Y. D., Lee, E., & Kim, Y. G. (2021). A comprehensive survey on security and privacy for electronic health data. International Journal of Environmental Research and Public Health, 18(18), 9668.
  • Ross, R. S. (2018). Risk management framework for information systems and organizations: A system life cycle approach for security and privacy.
  • Sameera V, Bindra A, Rath GP. Human errors and their prevention in healthcare. J Anaesthesiol Clin Pharmacol. 2021 Jul-Sep;37(3):328-335. doi: 10.4103/joacp.JOACP_364_19. Epub 2021 Oct 12. PMID: 34759539; PMCID: PMC8562433.
  • Tariq, R. A., & Hackert, P. B. (2018). Patient confidentiality. Available from: https://www.ncbi.nlm.nih.gov/books/NBK519540/
There are 16 citations in total.

Details

Primary Language English
Subjects Health Services and Systems (Other)
Journal Section Orginal Research
Authors

Filiz İşleyen 0000-0002-1277-5757

Mustafa Mahir Ülgü 0000-0003-0825-1851

Kemal Hakan Gülkesen 0000-0002-2477-2481

Early Pub Date April 29, 2024
Publication Date April 30, 2024
Published in Issue Year 2024

Cite

APA İşleyen, F., Ülgü, M. M., & Gülkesen, K. H. (2024). A National Minimum Health Log Standard; SAMILOG. Journal of International Health Sciences and Management, 10(19), 20-24. https://doi.org/10.48121/jihsam.1355992
AMA İşleyen F, Ülgü MM, Gülkesen KH. A National Minimum Health Log Standard; SAMILOG. Journal of International Health Sciences and Management. April 2024;10(19):20-24. doi:10.48121/jihsam.1355992
Chicago İşleyen, Filiz, Mustafa Mahir Ülgü, and Kemal Hakan Gülkesen. “A National Minimum Health Log Standard; SAMILOG”. Journal of International Health Sciences and Management 10, no. 19 (April 2024): 20-24. https://doi.org/10.48121/jihsam.1355992.
EndNote İşleyen F, Ülgü MM, Gülkesen KH (April 1, 2024) A National Minimum Health Log Standard; SAMILOG. Journal of International Health Sciences and Management 10 19 20–24.
IEEE F. İşleyen, M. M. Ülgü, and K. H. Gülkesen, “A National Minimum Health Log Standard; SAMILOG”, Journal of International Health Sciences and Management, vol. 10, no. 19, pp. 20–24, 2024, doi: 10.48121/jihsam.1355992.
ISNAD İşleyen, Filiz et al. “A National Minimum Health Log Standard; SAMILOG”. Journal of International Health Sciences and Management 10/19 (April 2024), 20-24. https://doi.org/10.48121/jihsam.1355992.
JAMA İşleyen F, Ülgü MM, Gülkesen KH. A National Minimum Health Log Standard; SAMILOG. Journal of International Health Sciences and Management. 2024;10:20–24.
MLA İşleyen, Filiz et al. “A National Minimum Health Log Standard; SAMILOG”. Journal of International Health Sciences and Management, vol. 10, no. 19, 2024, pp. 20-24, doi:10.48121/jihsam.1355992.
Vancouver İşleyen F, Ülgü MM, Gülkesen KH. A National Minimum Health Log Standard; SAMILOG. Journal of International Health Sciences and Management. 2024;10(19):20-4.