emails. This assurance can become critical on flows 
of personal health information from one provider to 
the other and/or on investigations of medical practice 
(ISO/TC215, 2006).  
Theft
: Theft of data and equipment is a serious 
problem in hospitals. Theft may cause breaches of 
confidentiality, either because confidential data 
resides on a server or laptop computer that is 
subsequently stolen or, else because the data itself is 
the target of the theft. The threat of theft personal 
health information increases with the fame or 
notoriety of the data subject (e.g. a celebrity or head 
of state) and decreases with the potential severity of 
punitive consequences - e.g. the loss by a physician of 
his or her license to practice (ISO/TC215, 2006). 
Terrorism
: Even having no notice of wide terrorist 
acts to healthcare institutions, once the healthcare 
infrastructure is usually part of the national or 
regional community sustainability infrastructure, once 
large scale health information systems are planned, 
the terrorist threat must be assessed due the possible 
effects on increased effectiveness of bioterrorist and 
other attacks that cause a health-related crisis 
(ISO/TC215, 2006). 
5 CONCLUSIONS 
From the exposed above, we explain that the 
establishment of an information security 
management system, compliant to international 
standards, gains complexity and scope extent when 
we are in a healthcare organization. This statement is 
reinforced by the existence of a technical committee 
within ISO to study the specificities of the use of 
informatics by healthcare service providers – the 
ISO TC 215 – and within this group, a subgroup 
focusing the information security needs. 
On the other hand, this additional complexity is a 
price to pay for the benefit of converting the patient 
information to an electronic form and so have the 
possibility of storing, retrieving, and distributing this 
information in an easier, faster, and cheaper way.  
We must remember that provisioning healthcare 
services itself is one of the most complex duties in 
terms of managing the needs and legal regulations of 
integrity, confidentiality, and availability of patient 
information. Therefore, the additional tasks that 
come with the informatization of these data are a 
natural consequence of its nature.  
This work will now continue in two steps. First we 
will try to identify the existing and used tools to 
implement the information security controls (e.g. 
standards toolkits and risks assessment tools). 
Second we will move on trying to map and score 
how compliant are healthcare organizations in our 
region to the international standards that are 
suggested by the Brazilian National Council of 
Medicine to allow the migration of hospitals to full 
electronic healthcare records. 
ACKNOWLEDGEMENTS 
We thank Mrs. Beatriz Leão (SBIS - Brazilian 
Association for Health Informatics) for supporting 
the development of this paper. 
We thank also CISCO do Brasil Ltda that is 
supporting the participation of the main author at 
HealthINF 2008. 
REFERENCES 
Cavalli, E, et al, 2004; Information security concepts and 
practices: the case of a provincial multi-specialty 
hospital; International Journal of Medical Informatics 
(2004) 73, 297-303. 
ISO, 2005; ISO/IEC 17799:2005 Information technology - 
Security techniques - Code of practice for information 
security management; International Standard 
Organization.  
Yip, F, et al, 2006; Enforcing business rules and 
information security policies through compliance 
audits; IEEE 1-4244-0176 - 03/2006. 
Ravera, L, et al, 2004; Security and privacy at the private 
multispecialty hospital istituto clinico humanitas: 
strategy and reality; International Journal of Medical 
Informatics (2004) 73, 321—324. 
ISO TC 215, 2000; ISO/TC 215 business plan template; 
International Standard Organization – Technical 
Committee 215 – Health Informatics (extracted from: 
http://isotc.iso.org/livelink/livelink/fetch/2000/2122/6
87806/ISO_TC_215__Health_informatics_.pdf?nodei
d=1001750&vernum=0; in Feb, 24th, 2007). 
ISO TC 215, 2006; ISO/Draft of international standard 
27799: health informatics — security management in 
health using ISO/IEC 17799, ICS 35.240.80; 2006; 
International Standard Organization – Technical 
Committee 215 – Health Informatics. 
Posthumus, L., 2004; Use of the ISO/IEC 17799 
framework in healthcare information security 
management; Stud Health Technol Inform. 2004, 
103:447-52 (PMID: 15747954). 
Hoffman, S.; Podgurski, A., 2006, In sickness, health, and 
cyberspace: protecting the security of electronic 
private health information; Social Science Research 
Network Electronic Paper Collection 
(http://ssrn.com/abstract=931069). 
HEALTHINF 2008 - International Conference on Health Informatics
208