Scenario 1: Going to a Doctors Appointment

Setting the Scene

As you log into the metaverse, you notice a notification from your doctor reminding you of your upcoming physical therapy appointment. [3][4]

Upon arrival at the clinic, you find yourself in a well-designed waiting room. The atmosphere is serene and calming, and as you wait, your thoughts wander to how everyone’s medical and personal information comes together through the internet to enable virtual healthcare services.

When it's your turn, you are greeted by an AI-powered assistant who records your medical history and vitals without physical assistance from a nurse. A few moments later, your doctor appears on the screen. They review your medical records and conduct a thorough examination. 

While the experience is impressive, you can't help but wonder about the reliability and accuracy of the technology and the potential for misuse or unauthorized access. As the visit concludes, the doctor prescribes medication, and you receive it at your doorstep.

Risk 1:
Data Privacy

You may worry about data privacy during a doctor's visit in the metaverse. You might wonder who can access your medical records and how secure your sensitive information is on this public platform. Security breaches and unauthorized access to your data during collection, transformation, or storage may also be a concern.

Risk 2:
Regulation Uncertainty

In the metaverse healthcare environment, you may be uncertain about the existing government regulations, such as HIPPA or FDA, that protect your personal and sensitive medical data. You may question if there are any laws in place to guarantee your safety and privacy.

Risk 3:
Medical Device Data Collection

You are required to wear medical devices (wearables for real-time like Spirometer, pulse oximeter, etc.) at home to measure vitals for your doctor's reference and checkup in the metaverse. However, you are uncertain about the safety of this technology when used in the physical world.[11]

Risk 4:
Identity Verification

You may wonder about the verification process for your virtual doctor's credentials and how to ensure they are qualified to diagnose and treat you. Similarly, your doctor may need to verify your identity to allocate prescriptions. The risk of drug abuse or misuse may arise if someone pretends to be you and obtains your prescription.

Justification of
Risk 1

Telehealth raises data privacy concerns with unclear information usage and third-party sharing. Patients historically had limited agency in data sharing, and the interconnectedness of providers complicates confidentiality and ownership. The metaverse healthcare's data models and interoperability pose challenges with unclear data control and usage.[5][6]

Justification of
Risk 2

HIPAA allows business associates to de-identify data, leading to a multibillion-dollar industry of health data aggregation companies. However, there are concerns over patient harm in the metaverse due to the lack of comprehensive data privacy laws.[8]

Justification of
Risk 3

IoT devices (Internet of Things devices are interconnected physical devices capable of collecting and exchanging data using sensors, software, etc., through the Internet), including medical devices worn by patients, increase the risk of unauthorized access and potential harm. It is unclear who is held responsible in the situation of misuse of these devices or poorly handled medical emergencies. Privacy loss is a major concern if these devices are hacked. The storage of metaverse/AR data, whether locally or in the cloud, raises questions about encryption and data security.[12][13][14][15]

Justification of
Risk 4

Telemedicine faces challenges with identity verification due to a lack of universal methodologies and integration of various technologies. Patient and doctor confidence in data gathering affects the accuracy and completeness of information, compromising effective care. [17][18][19]The US Food and Drug Administration (FDA) has warned that certain medical devices, including defibrillators and monitors, are vulnerable to hackers who could potentially manipulate the devices, causing harm to patients. The FDA has advised medical professionals and manufacturers to ensure their devices' security and monitor for suspicious activity. [20]

Compensating Controls

Current Controls
Risk 1

Currently, healthcare providers must follow the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. This federal privacy law sets a baseline of protection for certain individually identifiable health information. Healthcare providers need to obtain patients' written consent before they disclose their health information to other people and organizations, even for treatment. The HHS (U.S. Department of Health & Human Services) states that all parties must be notified in case of a breach. [7] A resolution agreement has to be reached, which may include paying a resolution amount.

Current Controls
Risk 2

HIPAA Covered Entities are required to comply with the Privacy Rule Training Standard – which applies to all workforce members regardless of whether they have access to PHI or not. According to the Security Rule, HIPAA training is required periodically. HHS can issue a penalty of up to $1.5 million per provision for HIPAA violations.[9]
HIPAA mandates that health care and health plan providers must give patients a notice that provides information on how they may use and share health information. It must also include your health privacy rights. An acknowledgment of the notice must be provided in writing to ensure that users are fully aware of the recording and usage of their medical data. [10]

Current Controls
Risk 3

Providers implement multiple tools such as multi-factor authentication, limited information sharing, regular software and security updates, and bug patches in smart devices to ensure that third parties cannot gain illegal access. NIST provides recommendations for manufacturers to empower users to take protective actions, including providing security tips and more options for controlling data being collected by devices.[16]

Current Controls
Risk 4

Third-party payers and medical service providers implement methods such as multi-factor authentication, identity verification with liveness detection, device ID verification, and behavioral identification that can detect fraudsters. [21]
Virtually all states require physicians providing telehealth services to be licensed in the state of the patient receiving care. Further, every site delivering telehealth services must fully credential the physician. Licensing and credentialing help ensure lawful practitioners provide patients with the best care possible.[22]

Our Mitigation Strategies

Mitigation Strategies
for Risk 1

Legislature:

  • The data (raw or processed) may be regulated via technical means like anonymization or legal regulations like General Data Protection Regulation (GDPR).
  • Explicit laws on restrictions of data collection, usage, and storage.
  • Third parties should be prohibited from selling or sharing data obtained from an organization.

Provider: 

  • Data sharing, such as targeted advertising, may be strictly regulated and documented to prevent misuse.

Mitigation Strategies
for Risk 2

Legislature:

  • Enforce that organizations arrange mandatory educational videos to introduce the platform to new users.
  • Enforce that organizations utilize banners to update users on privacy law amendments and the latest updates.

Provider: 

  • Create a provision for users to access and be informed (educated) on the laws passed to ensure the privacy of themselves and their information.

User: 

  • Users should carefully read and understand privacy notices and keep themselves updated on the latest in privacy law.

Mitigation Strategies
for Risk 3

Legislature:

  • Develop standard protocols and technical reviews by government agencies to validate the safe usage of medical devices.  

Provider: 

  • Organizations deploying AR/VR devices or platforms should strictly monitor the risks of hack attacks, data breaches, and other adversarial attacks. Similarly, these organizations will also need to plan for adversarial AI attacks and enable security from them. 

User: 

  • Users should deploy the use of online security tools that are designed to protect them from privacy invasions and data breaches.

Mitigation Strategies
for Risk 4

Legislature: 

  • Third-party payers like Medicare and Medicaid should require robust verification as prerequisites for payment for service, thus making medical facilities and doctors' offices liable for fraud and inappropriate identity verification.

Provider: 

  • The platform should conduct its verification before allowing a medical practice and should allow verified providers or practitioners to carry a label indicating their status.

User: 

  • Users should proactively book appointments with licensed practitioners with known providers.

Take me back to the home screen
Take me to Scenario 2