Abstract
The implementation of Electronic Medical Records (EMR) in all health service facilities is outlined in Minister of Health Regulation Number 24 of 2022, with a deadline of 31 December 2023. Ensuring the security of EMR is vital to protect patient data privacy, prevent unauthorized data access, and avoid breaches. This study evaluates the security practices of EMR systems at the Islamic Hospital Jakarta Sukapura using a descriptive qualitative research method with seven informants. The study focuses on six key aspects of EMR security: privacy, integrity, authentication, availability, access control, and non-repudiation. The results show that the hospital has established security procedures, such as using usernames and passwords, but there are significant areas for improvement. The study notes the need for automatic logout features to prevent unauthorized access when computer screens are left unattended and emphasizes the importance of regularly updating passwords to improve security, as well as hospitals using encryption and firewall technologies to protect data during transmission and storage. Apart from this, research shows that some staff members still use default passwords, posing a security risk. Overall, this study provides recommendations for strengthening RME security frameworks in hospitals.
References
[1] Presiden RI, “Undang-Undang Republik Indonesia Nomor 17 Tahun 2023 Tentang Kesehatan.” p. 4, 2023.
[2] Kemenkes RI, “Peraturan Menteri Kesehatan Republik Indonesia Nomor 82 Tahun 2013 Tentang Sistem Informasi Manajemen Rumah Sakit.” p. 2, 2013.
[3] Kemenkes RI, “Peraturan Menteri Kesehatan Republik Indonesia Nomor 24 Tahun 2022 Tentang Rekam Medis.” p. 3, 2022.
[4] M. K. Maha Wirajaya and N. M. U. K. Dewi, “Analisis Kesiapan Rumah Sakit Dharma Kerti Tabanan Menerapkan Rekam Medis Elektronik,” J. Kesehat. Vokasional, vol. 5, no. 1, p. 1, 2020, doi: 10.22146/jkesvo.53017.
[5] P. H. Yosi Tanjung, “Penerapan Algoritma Aes 625 Dalam Pengamanan Data Rekam Medis,” J. Glob. Tecnol. Comput., vol. 1, no. 3, pp. 77–83, 2022.
[6] S. Sofia, E. T. Ardianto, N. Muna, and S. Sabran, “Analisis Aspek Keamanan Informasi Data Pasien Pada Penerapan RME di Fasilitas Kesehatan,” J. Rekam Med. Manaj. Inf. Kesehat., vol. 1, no. 2, pp. 94–103, 2022, doi: 10.47134/rmik.v1i2.29.
[7] F. Akram, “Implementasi Password Stealing Attack Terhadap Saved Password Pada Browser Komputer Menggunakan Digispark Attiny85,” J. Ilm. Kriptologi, vol. 17, no. 1, pp. 7–14, 2023, doi: 10.56706/ik.v17i1.69.
[8] A. We’e, R. H. Nugroho, and H. Siswatibudi, “Evaluasi Aspek Keamanan Dan Kerahasiaan Rekam Medis Elektronik Di Rumah Sakit Panti Nugroho,” J. Permata Indones., vol. 14, no. 2, pp. 72–81, 2023, doi: 10.59737/jpi.v14i2.265.
[9] A. S. Wahyusesa, P. W. Hidayanto, and E. A. Ramdayani, “Solusi Cerdas: Meningkatkan Keamanan dan Kinerja Jaringan pada Warnet dengan Mengatasi Kelemahan Sistem,” J. Ilmu Multidisiplin, vol. 1, no. 2, pp. 62–66, 2023, [Online]. Available: https://ejournal.cvrobema.com/index.php/dike/article/view/39.
[10] H. Putri, M. R. Anshari, and G. Persadha, “Persiapan Implementasi Tanda Tangan Digitak Untuk Autentikasi Dokumen Rekam Medis Elektronik Di RSUD dr. H. Moch Ansari Saleh Banjarmasin,” J. Kaji. Ilm. Kesehat. Dan Teknol., vol. 5, no. 2, pp. 64–70, 2023, [Online]. Available: https://jurnal.polanka.ac.id/index.php/JKIKT/article/view/112.
[11] T. Rahmaddian and L. Faaghna, “Evaluasi Implementasi Sistem Informasi Manajemen Rumah Sakit (SIMRS) Rekam Medis dengan Metode Problem Solving Tools di Rumah Sakit X,” J. Kesehat., vol. 12, no. 2, pp. 339–345, 2023, doi: 10.46815/jk.v12i2.176.
[12] R. N. Belrado, Harmendo, and S. Wahab, “Analisis Penggunaan Rekam Medis Elektronik Di Rumah Sakit,” J. Penelit. Perawat Prof., vol. 6, no. 5474, pp. 1779–1798, 2024, [Online]. Available: https://www.jurnal.globalhealthsciencegroup.com/index.php/JPPP/article/view/3039.
[13] B. Wahab, A. Sembiring, A. Apriana, and Efrata, “Pendampingan Digitalisasi Berkas Rekam Medis Guna Mendukung Keberhasilan Implementasi Rekam Medis Elektronik Di RSUP Haji Adamalik Medan,” J. Pengabdi. Masy. Putri Hijau, vol. 4, no. 2, pp. 79–83, 2024, [Online]. Available: http://ejournal.delihusada.ac.id/index.php/JPMPH/article/view/1712.
[14] P. Shojaei, E. Vlahu-Gjorgievska, and Y. W. Chow, “Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review,” Computers, vol. 13, no. 2, 2024, doi: 10.3390/computers13020041.
[15] M. Hedda, B. A. Malin, C. Yan, and D. Fabbri, “Evaluating the Effectiveness of Auditing Rules for Electronic Health Record Systems,” Natl. Cent. Biotechnol. Inf., pp. 866–875, 2018, [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5977720/.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright (c) 2024 Endah Wardani, Daniel Happy Putra, Dina Sonia, Noor Yulia