IoT Devices for EMS: What First Responders Need to Know
By Scott Ellis
April 2, 2019
As an EMS first responder, you’re on the front lines of the medical field, providing urgent care in critical situations. With the introduction of a dedicated first responder cellular network in the U.S., EMS communication systems are expanding to embrace greater functionality and potential for sharing information more quickly and easily.
Technology is evolving to keep pace and provide EMS personnel with connected devices, routers and other equipment that will help save lives.
“We’re about to enter a new phase in our healthcare intervention efforts, and it will change how EMS is practiced,” writes Kevin McGinnis, a member of the First Responder Network Authority Board of Directors and longtime EMS system builder. “It will involve telemedicine and information sharing to help us bring greater clinical and operational decision-making into the field.”
As always, the rush of new products to the market brings potential risks. According to a Poneman report, 89% of health care entities experienced data breaches in 2016. Without adequate security measures, connected devices are vulnerable to cyberattacks. Private data such as patient records, hospital communications and vehicle locations could be hacked, and unauthorized users could access and control unprotected devices remotely.
As you choose the devices and equipment that will best fit the needs of your EMS system, here are a few topics to discuss with your solutions provider to ensure the continued success of your mission-critical work.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) legislates data privacy for all patients, making security a top priority in healthcare. Introducing additional connected devices into your EMS system creates potential doorways for data breaches and cyber attacks unless you take adequate security measures.
Here are a few security questions to discuss with your systems integrator to make sure patient data remains secure:
A device is the sum of its parts, and key components cannot afford to fail in mission-critical situations. Most devices have at least one primary component that’s easy to recognize — for example, the sensor, lens, and image processor on a body cam. In a piece of connected clothing, it might be the sensor that records the wearer’s vital signs.
Another essential piece of the device is its data card or cellular module. If a device’s connection fails, the patient data it has gathered becomes useless. And if the connection module lacks adequate security features, it could be vulnerable to cyberattacks.
To guard against device failure and security risks, ensure all key components are sourced from reliable manufacturers — preferably companies that are veterans in the M2M technology market. And ask about supply sustainability during international trade wars or other shipping complications.
Does the component supplier have an alternate product source if the primary manufacturing facility becomes inaccessible? Will they be there when you need replacement parts, or will they have vanished from the market?
One way to evaluate a device’s readiness for use in the field is by asking about the testing it’s been through before entering the market. Here are a few certification and ruggedness testing standards to consider:
As an EMS provider, you work under the knowledge of a “Golden Hour” — the sooner you reach trauma victims and connect them with definitive care, the better their chance of survival. IoT technology can help maximize that Golden Hour in many ways, but if a health monitor, smartphone, or other connected device fails during an emergency, your patients’ lives are put at risk.
Cyberattacks are another source of worry for healthcare IoT, as demonstrated by the 2017 WannaCry ransomware attack that took down IT systems at many of the UK’s National Health Service organizations, among other entities worldwide.
A 2018 report from the Royal Academy of Engineering warns of potential IoT vulnerabilities, especially in health care, and encourages more collaboration among engineers, software developers, systems integrators and users to boost cybersecurity and guard against attacks. IoT devices should be built to be dependable, able to be restored to connection quickly if they experience a service interruption, and secure by default.
“We cannot totally avoid failures or attacks, but we can design systems that are highly resilient and will recover quickly,” says Professor Nick Jennings, lead author of the report.
Seek assurance that the device and all of its key components are vetted for dependability, ruggedness, and security. Take time to learn about security features, including passwords and encryption, and learn how to reboot and recover data in case of device failure. The better you know your device, the better it can serve you as you focus on delivering the best patient care as quickly as possible.