A recent incident reported from a Hospital in US, has brought to focus the 
security hazards of computerization in the health industry. It has been reported 
in the instant case that a patient in a hospital was wrongly given a bar coded 
wrist band that indicated certain contra indications about his diabetic 
condition. The mistake could have caused administration of wrong drugs which 
could have been fatal to the patient.
 
 
  
This is just the tip of the iceberg when one analyses the risk of 
computerization in a critical industry like the Hospital industry. This is not 
to say that computerization does not have its advantages. In fact use of IT in 
Health care is of critical importance to the future generation. However what is 
important to note that in other forms of E-Commerce, a mistake or a "Security 
Lapse"  could lead to a financial loss while in the case of the Hospital 
industry, it could be a "Life and Death" problem.
 
 
  
So, How does the industry respond to these concerns of the health Industry? What 
is the role of "Tele Medicine Act" which is in the back burner in the 
regulator's chest?.. are some issues we need to ponder upon.
 
 
  
While the above case in the Hospital could be treated as one of "Negligence", 
"Inefficiency" or "Human Error", it cannot but be dismissed that more serious 
consequences could result from "Criminal" intentions executed through the 
computerized systems. These are "Cyber Crimes" in the Health Industry.
 
 
  
Presently the Hospital industry through out the world and more so in India is in 
the process of absorbing more and more technology into its operations and the 
"Risks" arising out of "Technological Failure", "Technological Inefficiency" and 
"Technology misuse" are yet to be the focus of computerization programmes.
 
 
  
It is necessary to point out that unlike say in an e-Governance project where we 
can take the stand.."Let us first start using Technology.. and then address 
security issues", we need to address the security issues in the Hospital 
projects concurrent with the initial computerization.
 
 
  
One key to this "Security in Computerized Hospital Environment" is to shift the 
focus of Security projects from "Technical Security" to "Techno Legal Security" 
and to undertake "CyLawCom audits" of Hospital systems.
 
 
  
The reason why "Legal Compliance Focus" could bring in an improvement to the 
system is that the management would be made aware of the consequences of 
"Medical Negligence" arising due to "Weak Technical Security".
 
 
  
By nature the IT Managers would focus on "Functionality" and Technical Security 
Mangers focus on "Intrusion Prevention". On the other hand "Techno-Legal 
Security Mangers" focus on "Consequences of Failure of Technical Security". 
Since the starting point of this process is "What if Technical Security is 
Breached"?, there is no psychological self assurance that "My Security is the 
best. This cannot be breached".
 
 
  
This also brings us to an important management concern on "CyLawCom Audits" 
which are audits of computerized environment with a focus on compliance of all 
legal issues concerning the management of business in the electronic environment 
and addresses the consequences of Cyber Crimes and Cyber Negligence on the 
owners of "Information Assets" and the needs of the "Information Asset Insurers" 
of "Who should conduct such audits?".
 
 
  
It appears that since the focus of the "CyLawCom audit" is "What if the 
Technical security is breached"?, the CyLawCom audit has to be conducted by a 
team which is different from the one that implements the Technical Security and 
should question several assumptions that the Technical security team makes as a 
"Management Assurance". It is difficult for the Technical Security implementers 
and auditors to also double up as "Techno Legal Security implementers and 
auditors" since one starts with the assumption that the other fails.
 
 
  
However the CyLawCom auditors must be able to understand the technical security 
risks and measures taken to mitigate them and assess their reasonableness so 
that they can certify what could be considered as "Due Diligence" in a given 
environment.
 
 
  
Hopefully, the best of the technical security managers who are open minded and 
capable of self criticism would with the acquisition of Cyber Law knowledge 
emerge as the "Techno legal security managers" over a period of time.