Skip to main content

Table 3 Security services in teledentistry

From: Technological aspects and recommendations for applying teledentistry in oral medicine: a scoping review

Main-theme

Sub-theme

Description of security services

Confidentiality

Patient

de-identification

- Photography only inside the mouth excluding the face [54]

- Sending images without any form of identification or clinical information [8]

- verbal disclosure of personal information only during video calls, being solely recorded in physical health records [8]

Patient

Data Encryption

- Encryption of the image and text document with series numbers to avoid patient ID [29,30,31]

- Encryption of transferred data in teledentistry networks [16]

- keep user passwords in encrypted text in database tables; and decrypt passwords in real time using an RD5 algorithm [16]

- Using Digital certificates includes public key, and other cryptographic information [16]

HIPAA confidentiality requirements

- Considering HIPAA confidentiality requirements [16]

Patient confidentiality of software

- Patient confidentiality is critical when selecting video communication software [36]

Patient record confidentiality

- Consider computer hosting and clinical facilities as confidential electronic records [16]

Authentication

Username

and password

- Photo uploading to a password-secure Dropbox folder [29]

- User identification using multiple identifiers such as demographics, telephone number, and ID cards [19]

- User name and password protection [16]

- Move patients to a password-protected virtual waiting room until the clinician is prepared to admit them to the meeting [17]

- All users must register before use and everyone must have a unique username and password to connect to the system [45]

- Use the user ID and password to login to the system and open a new teleconsultation request [48]

- Access information from a custom-made website through secure login [45]

Digital certificate

- Use certificates for health care providers on the intranet system, including log-in screens with unique identifiers and passwords [16]

- The Digital certificates serve to verify that the participants are authentic [16]

- Digital certificates must be changed periodically [16]

Server authentication

- Authentication of the server by means of the Microsoft/Microsoft Transaction Server security system with access available through secure back door ports such as SFTP and direct web script technologies [16]

Privacy

HIPAA regulation

- Considering HIPAA privacy regulations for All members of a health care team and the teledentistry network [16]

- consider an advanced computing facility for housing the databases of electronic dental records and teledentistry [16]

- privacy requirements must also be respected [12]

Data protection and privacy

- Using GDPR approvals in information processing [24]

Integrity

Using protocol

- Using a restricted secure file transfer protocol (SFTP) [16]

Digital certificates

- Using digital certificates in TLS to prevent eavesdroppers from monitoring data transfers [16]

- User's digital signature [16]

Data screen

- Screen data for completeness, consistency, and any irregularity by security filters[16]

Access control

role-based access control

- Access to the system for healthcare providers based on their role and a unique username and password. Security password tables are not available to public or clinical system administrators [16]

Availability

Using offline mode

- Saving data in offline mode when the internet is disrupted and uploading data automatically to the server when an internet connection is available [45]

Backup

- Maintain medical records in the database on the mail server and in the scanned medical records system [50]

- Print and file paper copies of the Patient Initial Electronic Report and Consultant Response in the Patient Notes at the Assessment Clinic, if system error occurs [14]

Device and media security controls

Physical security

- Delete photo from the smartphone after uploading it to Dropbox [29]

firewalls

- Providing security through firewalls for dental records to be stored in an electronic database [16]

filtering

- Router filtering [16]

Secure internet

- Using the HPSS net, a secure version of the Internet [14]

TLS, SSL

- Once on the intranet, create a Transaction Layer Security [TLS] or Secure Socket Layer (SSL) connection between each clinic and the host server in order to prevent external system hacking [16]

Secure application

- An Internet-based consulting system requires a secure Internet-based application [50]

- Security is paramount when choosing the Video Communications software [36]