Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance

被引:34
|
作者
Kramer, Daniel B. [1 ]
Baker, Matthew [1 ]
Ransford, Benjamin [2 ]
Molina-Markham, Andres [2 ]
Stewart, Quinn [2 ]
Fu, Kevin [2 ]
Reynolds, Matthew R. [1 ]
机构
[1] Harvard Univ, Beth Israel Deaconess Med Ctr, Dept Med, Sch Med, Boston, MA 02215 USA
[2] Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA
来源
PLOS ONE | 2012年 / 7卷 / 07期
基金
美国国家科学基金会;
关键词
DEFIBRILLATORS; RECALLS;
D O I
10.1371/journal.pone.0040200
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Background: Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods: We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Results: Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Conclusions: Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Identifying optimal postmarket surveillance strategies for medical and surgical devices: implications for policy, practice and research
    Gagliardi, Anna R.
    Umoquit, Muriah
    Lehoux, Pascale
    Ross, Sue
    Ducey, Ariel
    Urbach, David R.
    [J]. BMJ QUALITY & SAFETY, 2013, 22 (03) : 210 - 218
  • [22] Postmarket surveillance of high-risk medical devices needs transparent, comprehensive and independent registries
    Fraser, Alan G.
    [J]. BMJ SURGERY INTERVENTIONS & HEALTH TECHNOLOGIES, 2020, 2 (01)
  • [23] A Testbed for Security and Privacy Analysis of IoT Devices
    Tekeoglu, Ali
    Tosun, Ali Saman
    [J]. PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 343 - 348
  • [24] Security and Privacy of Medical Internet of Things Devices for Smart Homes
    Harvey, Paige
    Toutsop, Otily
    Kornegay, Kevin
    Alale, Excel
    Reaves, Don
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2020,
  • [25] Security and privacy issues in implantable medical devices: A comprehensive survey
    Camara, Carmen
    Pens-Lopez, Pedro
    Tapiador, Juan E.
    [J]. JOURNAL OF BIOMEDICAL INFORMATICS, 2015, 55 : 272 - 289
  • [26] A Comparative Review on the Wireless Implantable Medical Devices Privacy and Security
    Ankarali, Z. Esat
    Abbasi, Qammer H.
    Demir, A. Fatih
    Serpedin, Erchin
    Qaraqe, Khalid
    Arslan, Huseyin
    [J]. 2014 EAI 4TH INTERNATIONAL CONFERENCE ON WIRELESS MOBILE COMMUNICATION AND HEALTHCARE (MOBIHEALTH), 2014, : 246 - 249
  • [27] Harnessing the Power of Collaboration for Postmarket Surveillance of Hernia Mesh Devices
    Prabhu, Ajita S.
    Poulose, Benjamin K.
    Rosen, Michael J.
    [J]. ANNALS OF SURGERY, 2020, 271 (02) : 221 - 222
  • [28] (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices
    Choe, Yurak
    Yu, Hyungseok
    Kim, Taeho
    Lee, Shinjae
    Lee, Hojoon
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1630 - 1643
  • [29] Privacy and Security Encryption and Surveillance
    Feigenbaum, Joan
    [J]. COMMUNICATIONS OF THE ACM, 2019, 62 (05) : 27 - 29
  • [30] Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices
    Yaqoob, Tahreem
    Abbas, Haider
    Shafqat, Narmeen
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2020, 24 (06) : 1752 - 1761