Keywords

1 Introduction

Health Information Systems (HISs) have enabled healthcare staff to have easier access to patient information, however, they have also introduced the risk that patient information may be accessed by unauthorised personnel and not for purposes originally intended by the patient [1]. For this reason, patients should be informed not only why their data is being collected, stored or processed, but also who is accessing their data [2]. Such a requirement needs to be enforced through consent policies and privacy-preserving laws such as the Protection of Personal Information (PoPI) Act that allow the patient to permit or deny the disclosure of particular medical information from particular personnel [1, 3, 4]. Patients can choose who may access their medical information such as their HIV/AIDS status, previous abortions, substance abuse, psychiatric illnesses and genetic predisposition to diseases [5,6,7]. Improper disclosure of such sensitive information can influence decisions about a patient’s education, access to credit, or employment, and it may even expose the patient to reputational or personal harm [5, 8]. An HIS has the obligation to protect patient data in accordance with their individual consent boundaries [2] and when the effective enforcement of consent directives prevents undue disclosure of information, patients gain greater trust in electronic health record (EHR) systems [9]. In addition to ensuring the privacy of patient data, the procurement of informed consent reduces medical errors such as incorrect medical dosages and consequently reduces the number of medical malpractice claims [10].

Besides permitting and prohibiting the collection, access, use and disclosure of private health information, three other forms of consent directives exist, namely medical treatment consent, research participation consent, and advance care consent. It is imperative that a patient’s consent be unambiguous, informed and given freely [4, 11, 12] – furthermore, it must be as easy to revoke consent as it is to give it [11].

The introduction of a consent management platform affords a patient the opportunity to update his/her consent directives as necessary [3, 13]. The availability of such a mechanism also places patients in control of their information, as they can decide which information may be made available and to whom. Unauthorised access is thus prevented and accountable parties can easily be identified. The available literature suggests that the widespread use and acceptance of e-consent remains a challenge owing to the following reasons:

  • There is still a lack of privacy and security measures [14] in HISs, specifically regarding the enforcement and safeguarding of patients’ consent directives;

  • E-consent systems hinder the ease with which health practitioners can perform their medical duties [2] as the system will prohibit unauthorized users from performing specific actions until they are given the appropriate access rights;

  • The lack of an intuitive e-consent system makes it difficult for patients to manage their consent directives [1].

This paper provides a comprehensive review of the current state of e-consent systems in health information systems and identifies areas that still need to be addressed in the electronic patient consent management domain. In the following section, background concepts relevant to the literature referred to in this paper are provided. Section 3 details the research methodology that was followed to collect data for the study. Section 4 presents the findings of the survey. A discussion follows in Sect. 5 and the paper concludes in Sect. 6.

2 Background

This section provides some background on electronic consent, privacy and information security as these concepts facilitate privacy preservation in e-health systems.

2.1 Electronic Consent

It is important to discuss electronic consent, as it is the mechanism that allows patients to exercise the directives relating to their medical treatment and personal health information. Consent is considered informed when the patient is provided with sufficient information on the relevant processes, when adequate opportunity is given to the patient to consider alternative options, and when all the patient’s questions are answered [15].

Consent may be given in three formats, namely written, verbal and implied [16]. The written consent format is where the patient signs a document to confirm that he/she has entered into an agreement for a high-risk treatment or procedure [16]. Written consent is further categorised into paper-based and electronic-based formats.

With the introduction of e-health, physical signatures are no longer compulsory, and electronic signatures or activities such as ticking a box are acceptable instead [17]. Electronic consent can also be realised through tele-consent where video media are used to facilitate the consent process. Even with the adoption of e-health, patients are still giving written consent primarily through signing physical documents [7, 10, 15]. However, the continued use of physical documents is not ideal as paper and printing costs are expensive [10]; physical documents make patient information difficult to store, search and retrieve [15]; and it is difficult to enforce access control for physical documents [7]. Furthermore, forms filled in by hand are often incomplete, inaccurate or illegible [18]. In contrast, an electronic consent management system is considered a more efficient and reliable approach [14].

Verbal consent occurs where oral confirmation is given for a low-risk treatment or procedure [16], whereas implied consent is given when the patient indicates agreement to a health practitioner’s instructions (e.g. extending the arm to provide a routine blood sample for testing; taking or swallowing medication provided; attending an appointment for the purpose of receiving information or advice regarding management of the current condition) [16].

In e-health, consent implies that agreement is given for

  • the collection, access, use or disclosure of information;

  • medical treatment (agreement to undergo or reject specific medical treatments);

  • participation in research; and

  • advance care directives (e.g. Do Not Resuscitate orders).

Five directive options are available for e-consent: no consent; opt-in; opt-in with exceptions; opt-out; and opt-out with exceptions. An e-consent directive should also specify the subject of care, the grantee, the purpose and the time period covered by the consent [2]. Figure 1 illustrates the elements of an e-consent directive.

Fig. 1.
figure 1

e-Consent directive components [2]

The following section discusses the role of privacy and information security in e-consent.

2.2 Privacy and Information Security

Patients are the rightful owners of data that reside in HISs, and as such they may decline to disclose information that they feel may cause discrimination or stigma [19, 20]. In healthcare, the implications for practitioners who do not pay proper regard to the privacy of patients include sanctions from the Health Professions Council of South Africa, breach of privacy lawsuits, monetary penalty or even imprisonment [21]. The South African Protection of Personal Information (PoPI) Act recognises the right to privacy as stated in the Constitution and, as such, its purpose is to protect the processing of personal information by public and private bodies [21]. The PoPI Act is based on the best features of international privacy legislatures and it has given rise to eight information-processing principles. These PoPI principles [22] are summarised below:

  1. 1.

    Accountability: The responsible party must ensure that the eight information-processing principles are adhered to.

  2. 2.

    Processing limitation: Processing of information must be lawful and personal information may only be processed if it is adequate, relevant and not excessive for the purpose for which it is processed.

  3. 3.

    Purpose specification: Personal information must be collected for a specific, explicitly defined and lawful purpose related to a function or activity of the responsible party.

  4. 4.

    Further-processing limitation: Sometimes personal information is received from a third party and must be passed on to the responsible party for further processing. In these circumstances, the further processing must be compatible with the purpose for which it was initially collected.

  5. 5.

    Information quality: The responsible party must take reasonable and practical steps to ensure that the personal information is complete, accurate and not misleading. He/she must update the information where necessary, taking into account the purposes for which it was collected.

  6. 6.

    Openness: Personal information may only be processed by a responsible party that notified the Information Protection Regulator in advance. Furthermore, the responsible party must provide certain prescribed information to the data subject (the person/patient involved) by stating what information is collected, and whether or not the supply of the information by that data subject is voluntary or mandatory.

  7. 7.

    Security safeguards: The responsible party must secure the integrity of personal information in its possession or under its control by taking prescribed measures to prevent loss of, damage to, unauthorised destruction of, and unlawful access to or processing of personal data.

  8. 8.

    Data subject participation: A data subject has the right to request a responsible party to confirm, free of charge, whether the responsible party holds personal information about the data subject. The latter may also request from a responsible party the record or a description of the personal information held, including information about the identity of all third parties (or categories of all third parties) who have (or have held) access to the information. In addition, a data subject may request a responsible party to

    1. (a)

      correct or delete personal information about the data subject in its possession or under its control that is inaccurate, irrelevant, excessive, misleading or obtained unlawfully;

    2. (b)

      destroy or delete a record of personal information about the data subject that the responsible party is no longer authorised to retain.

When patient data are protected, patients gain greater trust in e-health systems and healthcare professionals [23,24,25]. Giving individuals control of their health information increases the quality and reliability of health data, which in turn reduces the occurrence of malpractice. When the quality and reliability of health research data is improved, the quality of healthcare is ultimately also enhanced [26].

An e-consent system or management platform needs to function beyond its responsibility to manage consent directives. It also needs to be supported by security functions that prevent unauthorised access to patient information [1]. A security layer ensures data integrity, data confidentiality, as well as nonrepudiation [1, 13]. Security approaches such as password protection, encryption, access control and audit trails can be used to monitor fraud and abuse, and to prevent unauthorised use and disclosure of data [24,25,26]. These approaches are essential, as insufficient data protection may subject a patient to embarrassment, social stigma and discrimination [23].

In the next section, the research methodology applied in the study is described.

3 Research Methodology

To provide an overview of the current state of electronic patient consent management, a literature review was conducted in the background section in which the information that is currently available on electronic patient consent management was examined and summarised. The information sources that were eligible, were papers that dealt with electronic consent in the e-health context. The specific criteria that were used to find eligible sources are discussed in the subsequent sections.

3.1 Search Criteria

Electronic journal databases such ACM Digital Library, IEEE Xplore Digital Library, PubMed Central, ScienceDirect and Springer Link were accessed during the period December 2017 to March 2018. Search terms including “patient consent management”, “e-consent”, “electronic consent”, “e-health”, “privacy” and “security” were applied. Boolean connectors such as AND and OR were used on the selected keywords in order to obtain more comprehensive search results. Altogether 33 papers met the required criteria and were used as literature sources for this paper.

3.2 Evaluation Criteria

The sources were subsequently evaluated against the concepts below:

  • Architectures, frameworks and standards – whether the literature considered standards such as HL7, Basic Patient Privacy Consents (BBPC) or Clinical Document Architecture (CDA), because they help facilitate interoperability in health information systems. There is currently a lack of standards or guidelines on how e-consent systems can be implemented best [17].

  • Information security measures – whether the literature considered information security approaches that value and ensure the privacy of patients’ health information and maintain the confidentiality, integrity and availability of patient health information.

  • Patient directive management – how patients are given control over their directives through settings that facilitate revocation, creation and modification.

  • Patient understanding – whether the literature explains how the e-consent process will ensure that the patient is provided with sufficient information to ensure that the consent given is informed.

  • Policies or regulations – whether the literature mentions the use of regulations that will guide the design of e-consent systems, as consent directives should be in line with the health institution’s policies as well as privacy laws.

The above evaluation criteria are essentially design focused, and therefore the discussion in the authors’ analysis will be divided into patient-centered design and privacy by design. Patient-centered design is aimed at asserting whether the design of a presented system had a patient’s needs in. Privacy by design focuses on the use of secure and confidentiality-driven approaches that are adopted when systems that contain or use personal user information are implemented. A complete analysis follows in Sects. 4 and 5.

4 Findings

This section presents a concept matrix as well as figures that illustrate observations made from the selected literature sources.

Table 1 presents a comparison of topics that constituted the focus of the selected literature in the health e-consent domain. These focus areas are the same as the evaluation criteria specified in the previous section. From the concept matrix in Table 1, it is evident that even though several journal papers covered some of the focus areas, there is a lack of research that covers all of the concepts specified in the evaluation criteria.

Table 1. Concept matrix for electronic patient consent management

Only 7 papers discussed the use of any standards or frameworks that should be used during the design of e-consent systems. Around 60% of the papers highlighted the importance of using security approaches that value and ensure the privacy of patients’ health information and maintain the confidentiality, integrity and availability of patient health information. Only 2 papers mentioned how directives should be accessible and manageable by patients within an e-consent system. The importance of patient understanding and policy regulation were discussed in 10 and 8 papers respectively.

A complete e-consent management system should implement all of these concepts as the application of information security techniques and regulations are essential for the pursuit of privacy preservation.

Figure 2 illustrates the components that encompass consent in healthcare. Four components of consent in healthcare were prominent, namely directive formats, types, attributes and options.

Fig. 2.
figure 2

Healthcare consent components

The directive options align with the need for patients to have the mechanism to manage their directives. The options should include no consent; opt-in; opt-in with exceptions; opt-out; and opt-out with exceptions.

The directive types that directly relate to information security are the privacy and research participation directives and it is also important for the appropriate privacy preserving policies and regulations to be applied.

A discussion of the foundational aspects of e-consent follows in Sect. 5.

5 Discussion

An e-consent system should have patient centricity as well as privacy centricity as its foundation; consequently, this section focuses on patient requirements and privacy by design in the e-health context.

5.1 Patient-Centred Design

The literature review found that comprehension, control and confidentiality are the main expectations that patients have when using e-consent systems.

Comprehension.

Consent is informed when a patient had a conversation with a health practitioner during which the alternatives, advantages and disadvantages of a process were thoroughly discussed [17, 18] until the patient understood the situation and was able to assess the risks fully [45]. If a surgeon, for instance, does not obtain informed consent prior to a procedure, the patient may afterwards accuse him/her of battery or negligence. This is significant as most negligence claims are a result of patients not fully understanding the possible complications of a procedure [18].

One of the difficulties faced by patients during the consent process is the fact that they are unable to understand the policies or terms and conditions involved, often because of the lengthy and complex language used [17, 29, 46]. A study that explored user behaviours when providing electronic consent on health social networks showed that 73% of people did not carefully read the terms and conditions, and only 17% understood the contents [46]. Long and complex policies should be replaced with brief and lucid communications to help patients understand better. Additionally, multimedia can be employed to help enhance comprehension, particularly for children [29]. The use of multi-language support, additional educational resources, as well as quizzing mechanisms will increase the level of understanding and individuals will be in a better position to control their healthcare directives.

Control.

Healthcare users have expressed the need for greater control over their consent directives [17]. This can be accomplished by adopting an individualised and transparent approach for each patient. Consent forms should be tailored for each patient [18] so that each component of the form is non-generic, relevant and complete. The patient should be able to express any of the consent directives, such as “no consent”, “opt-in”, “opt-in with exceptions”, “opt-out” or “opt-out with exceptions” – as illustrated in Fig. 2. This freedom is similar to social media privacy control settings and, coupled with transparency and usability, autonomy is given to the patient.

Confidentiality.

Concern about security and privacy issues in e-health has persisted ever since the first IoT botnet attack in 2013 [17]. A botnet attack can be used for denial-of-service attacks, for the collection of user information, or for stealthy user monitoring. Besides botnets, cookies are also a threat because even though they facilitate the functions of targeted advertising or keep login sessions alive, they were designed without proper consideration for information security [46]. Therefore, it is important to build systems that will take information security into account. For European citizens, the General Data Protection Regulation (GDPR), which comes into effect as from May 2018, will require from data controllers and processors to ensure security [17]. Non-adherence to the GDPR may lead to financial penalties [17]. In view of the GDPR, the Privacy-by-Design approach has been highlighted to facilitate security and privacy. The following section presents a discussion on Privacy by Design.

Table 2 illustrates the requirements as considered from the perspective of patients and healthcare practitioners.

Table 2. Technical and non-technical requirements for electronic consent management

5.2 Privacy by Design

Privacy by Design (PbD) is a concept developed to promote privacy and data protection in information technology and communication systems. Table 3 draws a comparison between the PbD principles and the PoPI principles. The principles for PbD [17, 47] are described as follows:

Table 3. Technical and non-technical requirements for electronic consent management
  • Proactive, not reactive: PbD should anticipate privacy risks and prevent them from materialising.

  • Privacy as the default setting: Personal data should automatically be protected by default with no added action required from the user.

  • Privacy embedded into design: Privacy measures should be embedded into the architecture and design of information technology systems as the integral component.

  • Full functionality: PbD should ensure that even though privacy is the core objective, it does not impair other functionalities of the system.

  • End-to-end security: Privacy should be continuously enforced across the entire lifecycle of the data. Without strong security, privacy cannot be realised.

  • Visibility and transparency: All stakeholders should operate according to the stated promises.

  • Respect for user privacy: A user-centric approach should be undertaken so that users can control their data. This involves requesting consent from the user and ensuring that the users have access to activities surrounding their information.

6 Conclusion

Health information systems enable the collection and use of electronic health data, which in turn provides benefits to various stakeholders [23, 24, 26, 46]. In most cases, the electronic health data found in medical systems is patient data. With their data being exchanged electronically, patients still need a means to give consent about who should and who should not access their data. This requires an electronic consent management mechanism. With proper consent management in place, medical researchers can conduct their work more efficiently as there is increased access to accurate information:

  • researchers can also use available data to investigate how high-quality and cost-effective healthcare may be provided;

  • the quality of clinical care is improved as immediate access to information enables quick and informed decision making regarding diagnoses and treatments for healthcare service providers;

  • patients can benefit by making informed decisions about service providers, medical treatments and health conditions in general.

The purpose of this paper was to provide a literature review on the current state of electronic consent management in healthcare. It showed that implementing an e-consent management system, even with the identified shortcomings, should be consideration for future research work. A survey should also be conducted to obtain the opinions of South African health practitioners and administrators on electronic consent management.