Question

In: Operations Management

Patient Portal Kaiser Permanente is an integrated health delivery system that serves more than eight million...

Patient Portal

Kaiser Permanente is an integrated health delivery system that serves more than eight million members in nine states and the District of Columbia. In the late 1990s, Kaiser Permanente introduced an Internet patient portal, Kaiser Permanente Online (also known as KP Online). Members can use KP Online to request appointments, request prescription refills, obtain health care service information, seek clinical advice, and participate in patient forums.

Information Systems Challenge

In August, there was a serious breach in the security of the KP Online pharmacy refill application. Programmers wrote a flawed script that actually concatenated over eight hundred individual e-mail messages containing individually identifiable patient information, instead of separating them as intended. As a result, nineteen members received e-mail messages with private information about multiple other members. Kaiser became aware of the problem when two members notified the organization that they had received the concatenated e-mail messages. Kaiser leadership considered this incident a significant breach of confidentiality and security. The organization immediately took steps to investigate and to offer apologies to those affected.

On the same day the first member notified Kaiser about receiving the problem e-mail, a crisis team was formed. The crisis team began a root cause analysis and a mitigation assessment process. Three days later Kaiser began notifying its members and issued a press release.

The investigation of the cause of the breach uncovered issues at the technical, individual, group, and organizational levels. At the technical level, Kaiser was using new web-based tools, applications, and processes. The pharmacy module had been evaluated in a test environment that was not equivalent to the production environment. At the individual level, two programmers, one from the e-mail group and one from the development group, working together for the first time in a new environment and working under intense pressure to quickly fix a serious problem, failed to adequately test code they produced as a patch for the pharmacy application. Three groups within Kaiser had responsibilities for KP Online: operations, e-mail, and development. Traditionally these groups worked independently and had distinct missions and organizational cultures. The breach revealed the differences in the way groups approached priorities. For example, the development group often let meeting deadlines dictate priorities. At the organizational level, Kaiser IT had a very complex organizational structure, leading to what Collmann and Cooper (2007, p. 239) call “compartmentalized sensemaking.” Each IT group “developed highly localized definitions of a situation, which created the possibility for failure when integrated into a common infrastructure.”

Discussion Prompt Answer the following questions in 2-4 sentences

1. How serious was this e-mail security breach? Why did the Kaiser Permanente leadership react so quickly to mitigate the possible damage done by the breach?
2. Assume that you were appointed as the administrative member of the crisis team created the day the breach was uncovered. After the initial apologies, what recommendations would you make for investigating the root cause(s) of the breach? Outline your suggested investigative steps.
3. How likely do you think future security breaches would be if Kaiser Permanente did not take steps to resolve the underlying group and organizational issues? Why?
4. What role should the administrative leadership of Kaiser Permanente take in ensuring that KP Online is secure? Apart from security and HIPAA training for all personnel, what steps can be taken at the organizational level to improve the security of KP Online?

Solutions

Expert Solution

1. The e-mail security breach was a serious violation of the 1996 HIPAA Privacy Rule. , KP’s actions disregarded HIPAA’s five following components:

· Boundaries, disclosure of information for health purposes only

· Security, information should be safeguarded by KP

· Consumer control, patients are to informed of disclosed information

· Accountability, KP would be charged under criminal and civil law for PHI disclosure

· Public responsibility, individual interests must not override national priorities in public health, medical research, or law enforcement .

Kaiser Permanente’s leadership reacted quickly because the company could face criminal charges and civil lawsuits. Although HIPAA Security Rule was under review in 2000, KP wanted to provide “evidence of Kaiser’s good faith and basic competence” by notifying affected members and relevant regulatory agencies . In fact, “the public press praised Kaiser’s forthright response” and members did not litigate .

2. I would recommend eight steps as found on the HIPAAdvisory.com website to the crisis team. Adherence to Weil’s eight steps will “improve the health care organization’s information security program” . For boundary definition, I would recommend asking KP personnel, via interviews and questionnaires, to list all patient-specific health information, external and internal healthcare information systems, and users of the information and systems. In addition, I would recommend the team inspect the organization to develop its own system list. In regards to threat identification, I would suggest the team identifies and lists possible threats to KP’s healthcare information systems. This list would include floods, fires, power outages, and human factors. In this instance, conducted investigations would primarily cover the repercussions of the operation technician’s patch for the pharmacy application server and the two KP programmer’s flawed e-mail script .   With reference to vulnerability identification, I would advise the team to list the company’s flaws or weak areas. According to Perrow, KP’s complex and tightly coupled system is “bound to fail eventually” . Due to their “early stage of an organizational [IT] life cycle” and changing environment, Vogus and Welbourne (2003) state KP was more likely to encounter “unexpected and unfamiliar sequences, and incomprehensible interactions” . Therefore, the crisis team should categorize KP IT’s recent national reorganization and launching of KP Online as weaknesses. Concerning security control analysis, the team should analyze KP’s security and preventive controls. This would involve investigating access controls, authentication procedures, and controls that detect actual or potential breaches. Unfortunately, the team will not find any controls in place. As for risk likelihood determination, I would recommend the team examine KP’s complex and tightly coupled system, and non-integrating IT departments. After a thorough assessment of KP’s organization, the team should rate the company’s risk as high, intermediate, or low for a threat to penetrate its system; level of impact as high, intermediate or low for the threat to capitalize on the company’s weak areas; and adequacy level of security controls as high, intermediate, or low risk. Similarly, the team will rate KP’s risk determination as high, intermediate or low for a future, repeat threat. By following these eight steps, the crisis team will develop proper policies and procedures for risk management to implement; and sanctions or consequences for noncompliant employees or individuals. In turn, the team will deter possible breaches and security violations.

3. If KP did not undergo organizational restructuring, then future HIPAA violations would have been unpreventable. The company’s inherent creation of errors and breaches was due to the “compartmentalized sense making characteristic of the various components of KP-IT” and employment of “high-hazard technological systems” . The departments were distinct entities with different set guidelines, procedures, and missions. Each IT department had its own problem-solving techniques. Incapable and untrained to function as a team, the compartmentalized departments functioned as separate businesses rather than as conjoined subunits of the IT department. Essentially, KP’s one hand did not know what the other hand was doing. KP’s technological structure mirrored a tightly coupled, complex system.  a tightly coupled system has interrelated component parts “in such a manner that there are few possible substitutions, time-dependent processes, and minimal slack and buffers” . Subsequently, KP’s complex system will continue to experience unanticipated events due to its intricately interacting components. Hence, KP’s dark future would be filled with incomprehensible occurrences tied to disastrous events .

4. To ensure that KP Online is secure, KP’s administrative leadership should design a system that protects “not only patient-specific information but also the organization’s IT assets - such as the networks, hardware, software, and applications- from potential threats” arising from human behavior and natural or environmental causes . The designed system should follow and adhere to the rules and regulations set by HIPAA Security Rule’s administrative, physical, and technical safeguards . However, the security program should safely balance restriction of the healthcare information system to invalid users with granting authorized users access to applicable healthcare data and information . To verify proper implementation of security measures, Wager, Lee, and Glaser (2009) recommend KP administration seek input from system end users and consultations from legal counsel and technical experts . To improve KP Online’s security, employees should avoid nonsecure websites; should not share passwords; should not install unauthorized software; should not use KP’s computers for personal use or profit; and protect hardware from theft.


Related Solutions

Kaiser Permanente must install a new $1.5 million computer to track patient records in its multiple...
Kaiser Permanente must install a new $1.5 million computer to track patient records in its multiple service areas. It plans to use the computer for only three years, at which time a brand new system will be acquired that will handle both billing and patient records. The company can obtain a 10 percent bank loan to buy the computer or it can lease the computer for three years. Assume that the following facts apply to the decision: - The computer...
Kaiser Permanente must install a new $1.5 million computer to track patient records in its multiple...
Kaiser Permanente must install a new $1.5 million computer to track patient records in its multiple service areas. It plans to use the computer for only three years, at which time a brand new system will be acquired that will handle both billing and patient records. The company can obtain a 10 percent bank loan to buy the computer or it can lease the computer for three years. Assume that the following facts apply to the decision: - The computer...
Kaiser Permanente: Best for Health Savings Account (HSA) Options Blue Cross Blue Shield: Best Large Provider...
Kaiser Permanente: Best for Health Savings Account (HSA) Options Blue Cross Blue Shield: Best Large Provider Network Unitedhealthcare: Best for Online Care Aetna: Best for Employer-Based Plans Cigna: Best for Telehealth Care HCSC: Best for Healthy Living Programs Molina Healthcare: Best for Preventive Care Many markets have at least some impediments that make it difficult for the competition to gain market share. Brand strength is a big one. Look at Blue Cross Blue Shield they continue to lead the health...
There are many integrated delivery system organizations providing health care. Identify a specific company, by name,...
There are many integrated delivery system organizations providing health care. Identify a specific company, by name, and identify which type of IDS it is. What is the difference between this business model for a health care provider versus a PPO where patients can choose the various components of providers from anywhere?
The other request is for an enhancement to implement a patient health portal for the EHR....
The other request is for an enhancement to implement a patient health portal for the EHR. Meaningful Use requires health organizations to provide patients a method to view personal health data and securely submit messages to the healthcare team. The types of patient health information to be included in a portal are health encounter records, clinical summaries, lab test results, preventative reminders, patient education, and secure messaging with the healthcare team. Review the PDF slides, How to successfully implement a...
Discuss two ways the patient portal can improve health care and patient safety.
Discuss two ways the patient portal can improve health care and patient safety.
What elements should be incorporated into a patient portal? Will patient portals and Personal Health Records...
What elements should be incorporated into a patient portal? Will patient portals and Personal Health Records work? Will they lead to a healthier population? How can wellness programs be incorporated into patient portals?
Kaiser e-Health Records Management System Implementation: Kaiser Foundation Health Plan/Hospitals’ implementation of HealthConnect, a $4 billion...
Kaiser e-Health Records Management System Implementation: Kaiser Foundation Health Plan/Hospitals’ implementation of HealthConnect, a $4 billion electronic health records management system from Epic Systems Corp., received media attention as another IT project in serious trouble. As the project drew public attention, Kaiser"s CIO, Cliff Dodd, resigned while another Kaiser employee, Justen Deal, sent a memo to all fellow employees detailing the project"s financial and technological problems. Deal, a publication project supervisor in the Health Education and Training Department, stated that...
Not more than ten sentences, discuss mental health in the patient in the hospital setting. (a)...
Not more than ten sentences, discuss mental health in the patient in the hospital setting. (a) Discuss functional abilities in the geriatric patient. give specific example in your text. (b) discuss assessment in the geriatric patient in the hospital. Focus on 3 areas only.
Scenario 1 – Robert Morris Health Robert Morris Health (RMH) is a 9-hospital integrated delivery network...
Scenario 1 – Robert Morris Health Robert Morris Health (RMH) is a 9-hospital integrated delivery network based in the Pittsburgh area in the United States. Currently each hospital orders its own supplies and manages the inventory. A common item used is a sterile Intravenous (IV) Starter Kit. Weekly demand for the IV Starter Kit is 600 units. (We assume that one year is 52 weeks.) The unit cost of an IV Starter Kit is $1.50. Robert Morris has estimated that...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT