How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

被引:19
作者
El Emam, Khaled [1 ,2 ]
Moreau, Katherine [1 ]
Jonker, Elizabeth [1 ]
机构
[1] Childrens Hosp Eastern Ontario, Res Inst, Ottawa, ON K1H 8L1, Canada
[2] Univ Ottawa, Fac Med, Dept Pediat, Ottawa, ON, Canada
关键词
Privacy; security; passwords; PRIVACY;
D O I
10.2196/jmir.1335
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Background: Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective: The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods: Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results: We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion: If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
引用
收藏
页码:13 / 22
页数:10
相关论文
共 58 条
[1]  
Andrews James E, 2004, Inform Prim Care, V12, P11
[2]  
[Anonymous], WALL STREET J
[3]  
[Anonymous], 2006, Inf. Syst. Secur., DOI DOI 10.1080/10658980601051318
[4]  
[Anonymous], 1994, Qualitative data analysis, DOI DOI 10.1080/0140528790010406
[5]  
*APPL CLIN TRIALS, 2009, DOC MAN IN COST SIT
[6]  
Berg G.G., 2008, CPA J, V78, P34
[7]  
BISKER S, 2002, GUIDELINES ELECT MAI
[8]  
Bower A., 2005, DIFFUSION VALUE HEAL
[9]   Encryption safe harbours and data breach notification laws [J].
Burdon M. ;
Reid J. ;
Low R. .
Computer Law and Security Review, 2010, 26 (05) :520-534
[10]  
BURDON M, 2010, P 2010 IEEE INT S TE