Patient Care Communications: Secure E-Mail

-- DRAFT --


Author Information

Richard Gadsden
Directory of Computer and Network Security
Center for Computing and Information Technology
Medical University of South Carolina

Statement of Problem

Sending standard, plaintext e-mail containing information related to the care of an identifiable MUSC patient violates both federal law and MUSC policy. Standard e-mail provides grossly inadequate safeguards for the confidentiality, integrity, and authenticity of the information it contains, making it completely unsuitable for the communication of patient care information.


Potential Solutions

There are two potential solutions to the problem. The first approach would be to require all persons communicating patient-care related information via e-mail -- including clinicians, patients, and other parties involved in their health care (e.g. family members) -- to use inherently secure e-mail software, such as PGP. The second approach would be to implement a stand-alone Web server to support secure e-mail communications among all these parties.

The Technical Overview section provides an overview of standard e-mail communications, secure communications using PGP, and secure communications using a stand-alone Web server.


Proposed Strategy

Although PGP is a better overall solution than a stand-alone Web server, there will be some users who, for one reason or another, cannot use a PGP-enabled e-mail client. Therefore, although we should recommend PGP as the preferred solution, we should also implement a stand-alone Web server as the "fall back" solution for users who cannot use PGP.

The costs of implementing, operating, maintaining and administering the proposed stand-alone Web server would be significant. However, with this Web server available, we would be able to offer both our clinicians and our patients a reasonably convenient and (to them) zero-cost way to exchange e-mail securely. While encouraging the use of PGP by those who are capable, we can avoid the high cost of supporting the use of PGP by less technically inclined users, by providing the stand-alone Web server for their use.

Over the next several years, more and more users in our target populations will be capable of using end-to-end secure e-mail protocols. As the use of PGP (and similar, standards-based protocols for secure e-mail) becomes more commonplace, the use of the stand-alone Web server would taper off, and the cost of maintaining and administering it would fall as well. Eventually, it could be retired from service.


Implementation Issues

Technical and administrative requirements, cost estimates, time frame for implementation, etc.


Technical Overview

In this section, we consider hypothetical users Alice and Bob, and illustrate the flow of data when Alice sends a message to Bob in each of three ways: (A) via standard e-mail, (B) via PGP, and (C) via a stand-alone Web server. After following the flow of data for each approach, we summarize its relative strengths and weaknesses.

A. Standard E-Mail

Please refer to Figure 1.

  1. Alice uses her e-mail client software to query Bob's LDAP server and obtain his e-mail address.

  2. Alice uses her e-mail client software to compose a message to Bob, and her e-mail client software then transmits her message (From: Alice, To: Bob) to her SMTP server.

  3. Alice's SMTP server relays the message to Bob's SMTP server.

  4. Bob's SMTP server relays the message to Bob's IMAP server, where it is stored in Bob's mailbox. Typically, Bob's e-mail client software will then inform him that he has received new mail from Alice.

  5. Bob uses his e-mail client software to retrieve a copy of the message from his mailbox on the IMAP server. Bob reads the message, which appears to be From: Alice.

Strengths:

Weaknesses:

B. PGP

Please refer to Figure 1 again.

  1. If Alice does not already know Bob's public key, she uses her e-mail client software (with built-in support for PGP) to obtain Bob's public key from his LDAP server.

  2. Alice uses her e-mail client software to compose a message to Bob, which she then encrypts with Bob's public key and signs with her private key, and her e-mail client software then transmits her encrypted message (From: Alice, To: Bob) to her SMTP server.

  3. Alice's SMTP server relays the encrypted message to Bob's SMTP server.

  4. Bob's SMTP server relays the encrypted message to Bob's IMAP server where, still encrypted, it is stored in Bob's mailbox. Typically, Bob's e-mail client software will then inform him that he has received new mail from Alice.

  5. Bob uses his e-mail client software to retrieve a copy of the encrypted message from his mailbox on the IMAP server. Bob's e-mail client software uses Bob's private key to decrypt the message, which appears to be From: Alice.

  6. If Bob does not already know Alice's public key, he uses his e-mail client software to obtain Alice's public key from her LDAP server. Bob's e-mail client software can then use Alice's public key to verify her signature, confirming that Alice was in fact the author of the message. Bob's e-mail client software can also verify that the message has not been altered since Alice composed it.

Strengths:

Weaknesses:

C. Stand-Alone Web Server

Please refer to Figure 2 now. The Web server is "stand-alone" in the sense that the Web server would not accept messages from any other e-mail servers, nor would it relay messages to any other e-mail servers, except as described in Step 3 below. All users of the Web server would need an account and a mailbox on the Web server, and so all messages "in the system" would be authenticated. Message confidentiality and integrity, at least during network transmission between the server and users' Web browsers, would be protected by SSL.

  1. Alice uses her Web browser to log into the Web server and query the server for Bob's address.

  2. Alice uses her Web browser with a form presented by the Web server to compose a message to Bob. When she posts the form, the Web server will store the message (From: Alice, To: Bob) in Bob's mailbox on the Web server.

  3. The Web server sends a terse "You have mail on the Web server" message to Bob's SMTP server.

  4. Bob's SMTP server relays the "You have mail" message to Bob's IMAP server, where it is stored in Bob's mailbox. Typically, Bob's e-mail client software will then inform him that he has received new mail from the Web server.

  5. Bob uses his e-mail client software to retrieve a copy of the "You have mail" message from his mailbox on the IMAP server. Conveniently, this terse message contains a URL which Bob can access to read Alice's message. Bob clicks on the URL or pastes it into his Web browser. Bob uses his Web browser to log into the Web server, and reads the message from Alice.

Strengths:

Weaknesses:


Last modified: $Id: email-security-proposal.html,v 1.6 2001/05/31 13:44:38 gadsden Exp $