Protocol for Systematic Review in Privacy and Security in Telehealth: Best Practices for Healthcare Professionals

Authors

  • Valerie J.M. Watzlaf Department of Health Information Management, School of Health and Rehabilitation Sciences, University of Pittsburgh, Pittsburgh, PA
  • Dilhari R. DeAlmeida Department of Health Information Management, School of Health and Rehabilitation Sciences, University of Pittsburgh, Pittsburgh, PA
  • Leming Zhou Department of Health Information Management, School of Health and Rehabilitation Sciences, University of Pittsburgh, Pittsburgh, PA
  • Linda M. Hartman Health Sciences Library System University of Pittsburgh, Pittsburgh, PA

DOI:

https://doi.org/10.5195/ijt.2015.6186

Abstract

Healthcare professionals engaged in telehealth are faced with complex US federal regulations (e.g., HIPAA/HITECH) and could benefit from the guidance provided by best practices in Privacy and Security (P&S). This article describes a systematic review protocol to address this need. The protocol described herein uses the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P). The PRISMA-P contains 17 items that are considered essential, as well as minimum components to include in systematic reviews. PICOS (participants, interventions, comparisons, outcome(s) and study design of the systematic review) are also relevant to the development of best practices in P&S in telehealth systems. A systematic process can best determine what information should be included and how this information should be retrieved, condensed, analyzed, organized, and disseminated.

  

References

Armfielda, N., Bradforda, M., & Bradforda, N. (2015) The clinical use of Skype—For which patients, with which problems and in which settings? A snapshot review of the literature. International Journal of Medical Informatics, 84, 737-742. doi:10.1016/j.ijmedinf.2015.06.006

Bramer, W., Holland, L., Mollema, J., Hannon, T., & Bekhuis, T. (2014.). Removing duplicates in retrieval sets from electronic databases: Comparing the efficiency and accuracy of the Bramer-method with other methods and software packages. Retrieved from http://www.iss.it/binary/eahi/cont/57_Bramer_Wichor_Full_text.pdf

Cochrane Effective Practice and Organisation of Care Group (EPOC). (2002). The Cochrane Collaboration’s tool for assessing risk bias. Retrieved from http://ohg.cochrane.org/sites/ohg.cochrane.org/files/uploads/Risk%20of%20bias%20assessment%20tool.pdf

Cohn, E., & Watzlaf, V. (2012) Telepractice and informed consent: Readability of VoIP privacy practices, Poster Session 7211, American Speech-Language Hearing Association.

Garg, V., & Brewer, J. (2011). Telemedicine security: A systematic review. Journal of Diabetes Science and Technology, 5, 768-777.

Development and Evaluation (short GRADE) Working Group. (2015). Grading of recommendations assessment. Retrieved from http://www.gradeworkinggroup.org/index.htm

Hall, J., & McGraw, D. (2014). For telehealth to succeed, privacy and security risks must be identified and addressed. Health Affairs, 33, 216-221.

Health Resources and Services Administration (HRSA). (2015). Telehealth. Retrieved from http://www.hrsa.gov/ruralhealth/about/telehealth/

HealthIT.gov. (2014). What is telehealth? How is telehealth different than telemedicine? Retrieved from https://www.healthit.gov/providers-professionals/faqs/what-telehealth-how-telehealth-different-telemedicine

HealthIT.gov. (2009). Excerpts from the American Recovery and Reinvestment Act of 2009 (ARRA). Retrieved from http://healthit.gov/sites/default/files/hitech_act_excerpt_from_arra_with_index.pdf

Higgins, J., & Green, S. (Eds). (2011). Cochrane Handbook for Systematic Reviews of Interventions Version 5.1.0. Retrieved from http://handbook.cochrane.org/

Higgins, J., Altman, D., Gøtzsche, P., Jüni, P., Moher, D., Oxman, A…Sterne, J.A.C. (2011). The Cochrane Collaboration’s tool for assessing risk of bias in randomised trials. British Medical Journal, 343:d5928. http://www.bmj.com/content/343/bmj.d5928

Moher, D., Shamseer, L., Clarke, M., Ghersi, D., Liberati, A., Petticrew, M…Stewart, L.A. (2015). Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) statement. Systematic Reviews 4, 1. doi:10.1186/2046-4053-4-1.

Peterson, C., & Watzlaf, V. (2015, March). Practical privacy and security concepts regarding store and forward apps commonly used for telerehabilitation practice and education. Presentation at the American Telemedicine Association, Telerehabilitation SIG, online.

Rinehart-Thompson, L. (2013). Introduction to health information privacy and security. Chicago: AHIMA Press.

Sirintrapun, S. J., & Cimic, A. (2012). Dynamic nonrobotic telemicroscopy via Skype: A cost effective solution to teleconsultation. Journal of Pathology Informatics, 3, 28. doi:10.4103/2153-3539.100150

United States Department of Health and Human Services, Office of Civil Rights (OCR), Health Information Privacy. (2015). The Privacy Rule. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/

United States Department of Health and Human Services, Office of Civil Rights (OCR), Health Information Privacy.(2003) The Security Rule. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/index.html

United States Department of Health and Human Services, Office of Civil Rights (OCR), Health information privacy. (2015) Audit Program Protocol. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol2.html

Waddington, H., White, H., Snilstveit, B., Hombrados, J., Vojtkova, M., Davies, P.,…Tugwell, P. (2012). How to do a good systematic review of effects in international development: A tool kit. Journal of Development Effectiveness, 4,359–387. doi: 10.1080/19439342.2012.711765.

Watzlaf, V. (2010, May). Are your internet based technology practices HIPAA compliant? Presentation at the American Telemedicine Association, Telerehabilitation SIG, online.

Watzlaf, V., Moeini, S., Matusow, L., & Firouzan, P. (April, 2011). Privacy and security assessment for Internet-based technologies. Presentation at the Pennsylvania Speech and Hearing Association Conference, Pittsburgh, PA.

Watzlaf, V., Moeini, S., & Firouzan, P. (2010). VoIP for telerehabilitation: A risk analysis for privacy, security, and HIPAA compliance, International Journal for Telerehabilitation, 2(2), 3-14.

Watzlaf, V., Moeini, S., Matusow, L., & Firouzan, P., (2011). VoIP for telerehabilitation: A risk analysis for privacy, security, and HIPAA compliance: Part II. International Journal for Telerehabilitation, 3(1), 3-10.

Watzlaf, V., & Ondich, B. (2012). VoIP for telerehabilitation: A pilot usability study for HIPAA compliance. International Journal for Telerehabilitation, 4(1), 33-36.

Wells, G., Shea, B., O'Connell, D., Peterson, J., Welch, V., Losos, M., & Tugwell, P. (2014). The Newcastle-Ottawa Scale (NOS) for assessing the quality of nonrandomised studies in meta-analyses. Retrieved from http://www.ohri.ca/programs/clinical_epidemiology/oxford.asp

Downloads

Published

2015-11-20

How to Cite

Watzlaf, V. J., DeAlmeida, D. R., Zhou, L., & Hartman, L. M. (2015). Protocol for Systematic Review in Privacy and Security in Telehealth: Best Practices for Healthcare Professionals. International Journal of Telerehabilitation, 7(2), 15–22. https://doi.org/10.5195/ijt.2015.6186

Issue

Section

Privacy and Security

Most read articles by the same author(s)