SUMMARY OF A PRIVACY IMPACT ASSESSMENT FOR THE ONTARIO BRAIN INSTITUTE S BRAIN-CODE

Size: px
Start display at page:

Download "SUMMARY OF A PRIVACY IMPACT ASSESSMENT FOR THE ONTARIO BRAIN INSTITUTE S BRAIN-CODE"

Transcription

1 SUMMARY OF A PRIVACY IMPACT ASSESSMENT FOR THE ONTARIO BRAIN INSTITUTE S BRAIN-CODE Ontario Brain Institute July 10, 2014

2 1.0 Introduction and Executive Summary 1.1 Introduction The Ontario Brain Institute (OBI) was established in November 2010 with an initial $15 million investment by Ontario s Ministry of Economic Development and Innovation to focus the province s investments in research and innovation as well as to promote the commercialization of neuroscience research and to leverage private sector funding. OBI was created to become an internationally recognized centre of excellence in brain and neuroscience research, with an emphasis brain and neuroscience research. It focuses on clinical application, commercialization and education/training related to the prevention, early detection, diagnosis and ultimately, control of brain diseases and disorders. On March 5, 2013, the government of Ontario announced additional funding in the amount of $100 million over 5 years. What is unique about this endeavour is that OBI initiates, funds, promotes, stimulates and translates related research across a variety of disciplines. It supports integrated discovery programs (IDPs) that focus on a specific brain disease or disorder, across the health spectrum, conceptually from cradle to grave. OBI s vision is: Converge. Discover. Deliver. To support its work, OBI asked the Integrated Data Organizing Centre Consortium (InDOC, described further in s. 2.1 below) to establish and maintain a comprehensive data management solution. As such, OBI has built a platform to house research data, called Brain-CODE, where CODE stands for Centre for Ontario Data Exploration. Brain-CODE is an extensible informatics platform that manages acquisition and storage of multidimensional data collected from patients with a variety of brain disorders. This solution enables centralized collection and analysis of data from diverse diseases, data sources and geographic locations. InDOC s initial deliverables were to: Collect research program data transfer and functional requirements Deploy database systems Deploy Brain-CODE, the hardware platform which is the engine for the OBI initiative This privacy impact assessment (PIA) analyzes Brain-CODE from the perspective of Ontario privacy legislation, regulations and industry best practices applicable to OBI and its handling of personal health information (PHI). It will raise relevant orders and/or guidelines issued by the Information and Privacy 2

3 Commissioner/Ontario as applicable. It will provide an overview of key users of Brain-CODE and how information is proposed to flow, to whom, and under what authority. Data flows will be grouped into discrete categories, namely, collections, uses and disclosures, with discussion of OBI s contemplated zonebased infrastructure within which these activities occur. 1.2 Dykeman Dewhirst O Brien LLP Dykeman Dewhirst O Brien LLP (DDO) is a boutique health law firm in Toronto. The work for this project was completed under the leadership of Mary Jane Dykeman; and up to March 31, 2013, with the assistance of her colleague, Abigail Carter-Langford. DDO and Abigail Carter-Langford bring significant legal and privacy experience to this initiative, with particular strengths in health privacy law including the nuances of applicable legislation and data use in health research settings. They have a collective understanding of the health system and framework within which health care and research organizations operate. 1.3 Structure and Objectives of Brain-CODE Brain-CODE is a data management platform created to enable researchers to make a vast array of comparisons across a range of brain-related diseases. It is anticipated that consolidating all of the data in a single platform will help researchers find patterns and trends they may otherwise not see when reviewing data housed in different databases and in the custody and control of various organizations. The intent is to minimize duplication in both research efforts and data storage systems, create much larger patient populations for clinical trials, and offer new perspectives that may ultimately lead to new discoveries. Through its selected vendor, Ontario Cancer Biomarker Network (OCBN), OBI proposes to use specific clinical data management systems to facilitate researcher access to data held securely within Brain-CODE. Access to data will be subject to robust processes including: Research ethics review Legal agreements with applicable hospitals, universities and associated research institutes (including research activity agreements with those 3

4 institutions initially contributing data as well as participation agreements with all those who become part of the OBI community) Creation of and adherence to a sound governance framework In effect, Brain-CODE provides a platform to facilitate a single point of storage of and access to study data and for researchers to access a number of applications. The core functionalities of Brain-CODE will provide researchers with the following: Single sign-on to multiple applications Facility to store and access various data types including clinical assessments, registries, MRI, EEG, PET, genomics and proteomics assays as appropriate to the research plan Capacity to encrypt health card numbers at the point of collection in Brain-CODE, while certain limited PHI will remain unencrypted for access by researchers Capacity to store direct identifiers in Brain-CODE in limited circumstances and subject to stringent rules Some of the initial outcomes to be measured by OBI in respect of Brain-CODE will include: Provide safeguards for health and research data while facilitating access to it for legitimate research purposes Improved research insight in a single view through the creation of a standardized, comprehensive, rich and accessible database of clinical and biological assessments and imaging Help scaffold the creation of cross-institutional teams of basic, clinical and applied scientists engaged in multi-disciplinary research Help develop and support partnerships of researchers and clinicians with industry, charitable organizations, industry and government to translate results into improved patient care In addition to the identified research programs above, it is intended that controlled access to limited sets of data in Brain-CODE will be provided to additional approved researchers and organizations joining the OBI community. This will be discussed from a governance perspective in further detail below. 4

5 2.0 Description of Brain-CODE 2.1 Data Flows and Source Applications OBI has contracted with OCBN for OCBN to assemble and manage a consortium called InDOC, to facilitate the development, maintenance and operations of Brain-CODE. Each of the InDOC members brings complementary capabilities to the Brain-CODE platform: Performance Computing Virtual Lab (HPCVL) at Queen s University with high performance computing hardware and storage Rotman Research Institute (RRI) and Heart and Stroke Foundation Centre for Stroke Recovery (CSR) at Baycrest Centre for Geriatric Care with neuroimaging informatics infrastructure OCBN with management of molecular data and the overall Brain-CODE platform Electronic Health Information Laboratory (EHIL) at the Children s Hospital of Eastern Ontario who have developed a set of deidentification and risk analysis tools that will be applied to data prior to disclosure. The current integrated discovery system programs scheduled to initially populate and leverage the Brain-CODE platform include: Childhood Hemiplegic Cerebral Palsy Integrated Neuroscience Discovery Network (CP-NET) The Epilepsy Discovery Project (Ep-Link) Province of Ontario Neurodevelopmental Disorders Network (POND) Non-Invasive Brain Stimulation plus Pharmacotherapy to restore Self- Regulation in Addicted or At-Risk Populations Ontario Neurodegenerative Disease Research Initiative (ONDRI) Degeneration and developing an informal Database for patients with Concussion in Ontario The Canadian Biomarker Integration Network for Depression (CAN-BIND) Key functional requirements of these initially identified research programs include: the use of clinical data management systems such as Medidata RAVE, OpenClinica Enterprise and REDCap to support electronic data 5

6 capture (EDC) of clinical assessment and registry data from all research programs - i.e. each program is using one or more of these data management systems for the capture and storage of study clinical data; the use of the Stroke Patient Recovery Research Database (SPReD), a neuroimaging data archiving system based on the open source XNAT framework to support the collection of MRI, PET, and EEG data sets from all research programs; and the use of the BioArray Software Environment (BASE) system to support the collection of genomics and proteomics data sets from all research programs. These software applications are a mix of commercial tools, tools developed by the InDOC participants and open-source applications. Database systems including Medidata RAVE, OpenClinica Enterprise, REDCap, SPReD and BASE were installed in the Brain CODE data centre environment. In some cases, an instance of one of the software applications listed above may be installed at the data collection site. Web based user interfaces for Medidata RAVE, OpenClinica Enterprise, REDCap, SPReD and BASE are available for direct access by research teams for the electronic capture of clinical data, and uploading of neuroimaging (SPReD) and molecular (BASE) data sets. Access to these applications is protected by encrypted and authenticated connections. A critical safeguard is the application of privacy enhancing technologies from EHIL. EHIL is tasked with providing software development services to support the encryption of health card numbers (HCNs) (issued pursuant to the Ontario Health Insurance Plan under the Health Insurance Act 1 ) and the secure comparison and matching of subject records based on encrypted HCN between Brain-CODE and external data sources. It is anticipated that to ensure the Brain-CODE data set is protected against reidentification to the extent possible, the encryption functionality will be applied as necessary should other elements of PHI (name, address, demographics, etc.) be required for collection in Brain-CODE. The data entry forms for the software applications mentioned above have been specifically designed to omit filed that correspond to directly identifying elements. EHIL s Privacy Analytics Risk Assessment Tool (PARAT) will be applied to data from Brain-CODE prior to disclosure to researchers to remove identifying information 1 R.S.O. 1990, c. H.6. 6

7 to the extent possible. PARAT will also be used to ensure the risk for reidentification meets a predetermined threshold while maximizing data granularity. 2 HCNs, which are inherently identifiable, will be encrypted prior to their upload into Brain-CODE, using an algorithm developed by EHIL. Brain-CODE, and all of the data it contains, will be hosted at HPCVL in Kingston, Ontario, with backup provided by a separate secure location at Queen s University, also in Kingston. OCBN currently has a subcontract agreement with Queen's University which provides hosting and related services for Brain-CODE infrastructure and data. Original Purpose of Collection In each instance, PHI is collected for clinical purposes and becomes part of a given research study; the currently identified sources of this information are the studies listed above. These studies have been reviewed and approved by research ethics boards of the respective health information custodians where the PHI originated (i.e., from hospitals collecting PHI from patients for clinical purposes). Data collected for the purposes of these studies have direct identifiers removed, unless approved by an REB, and HCNs are encrypted as described above. The collection and upload of identifying information described in the approved research proposals requires consent of the participants (unless, in rare instances, the applicable research ethics board provides a waiver of consent as permitted under PHIPA 3 ). Consent is also sought to permit the secondary use of de-identified study information for placement in Brain-CODE to enable additional approved research. In some instances, PHI will be held in Brain-CODE for which direct and indirect identifiers cannot be removed. This will be discussed in further detail below. 2.2 Privacy by Design OBI has committed to using a Privacy by Design approach to the development and implementation of the Brain-CODE platform. This is an approach pioneered 2 See: for a discussion of the use of de-identification tools to protect personal health information; see also this description: 3 PHIPA, s. 44(3)(d) states that, among other considerations, an REB must determine whether obtaining the consent of the individuals whose personal health information is being disclosed would be impractical. 7

8 by the Information and Privacy Commissioner/Ontario that encourages the use of privacy-enhancing technologies and processes to minimize or address the threats to privacy that technological innovations can pose. The seven principles of Privacy by Design are as follows: 4 Privacy by Design Principle 1. Proactive not Reactive; Preventative not Remedial The Privacy by Design (PbD) approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy invasive events before they happen. 2. Privacy as the Default Setting Privacy by Design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. OBI approach OBI continues to prioritize privacy and security leadership and seek out global best practices to implement. In August 2012, OBI brought together world and local leaders to a symposium intended to generate ideas and best practices in the management and integration of large data sets. This symposium included sessions dedicated to understanding the challenges to privacy and security and generating ideas to address these challenges. These discussions were guided by the Information and Privacy Commissioner /Ontario s instruction on Privacy by Design. OBI continues to meet regularly with the Information and Privacy Commissioner/Ontario to discuss Brain- CODE. To the extent possible, direct identifiers are removed prior to transfer of data into Brain-CODE. This process has been implemented both to ensure compliance with regulatory compliance and to maximize the protection of the information by not collecting identifiable information as the default process. In a few instances, such as with imaging data, this may be necessary and appropriate consents and protections are in place. Software is available that can remove file headers, which may contain direct identifiers, and facial features. 4 (last accessed on: September 3, 2013). 8

9 Privacy by Design Principle 3. Privacy Embedded into Design Privacy by Design is embedded into the design and architecture of IT systems and business practices. Privacy is integral to the system, without diminishing functionality. 4. Full Functionality Positive-Sum, not Zero-Sum Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum win-win manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. 5. End-to-End Security Full Lifecycle Protection Privacy by Design, having been embedded into the system prior to the first element of information being collected, extends securely throughout the entire lifecycle of the data involved strong security measures are essential to privacy, from start to finish. 6. Visibility and Transparency Keep it Open Privacy by Design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visible and transparent, to users and providers alike. 7. Respect for User Privacy Keep it User-Centric Above all, Privacy by Design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options OBI approach From the initiation of the procurement process to develop Brain-CODE, privacy and security have been a core value and design requirement. Data entry forms have been configured such that the fields corresponding to identifiable information are limited or omitted altogether. Brain-CODE leverages the advanced technology and techniques of EHIL to encrypt health card numbers and to assess the potential risk of reidentification prior to release. This approach maximizes the amount of uniquely identified information available to researchers while mitigating the risk of re-identification to research participants. In addition to being developed and retained in an environment that emphasizes industry leading security protections described in greater detail in the section labelled Safeguards, the Brain-CODE platform leverages industry leading Certificate management processes and technology for authentication. OBI has implemented a robust governance process and tracking processes to oversee the development and operations of Brain-CODE. An independently conducted PIA has been undertaken and the results of this activity will be shared with Information and Privacy Commissioner/Ontario and a commitment made to make the document available publicly to both researchers and participants. Brain-CODE is a consent-based platform where research participants are informed and voluntary contributors and know that by consenting to the research in question, they are agreeing to have their PHI placed in the OBI platform, Brain-CODE. 9

10 2.3 Goals & Objectives of the PIA This PIA analyzes privacy risks associated with the implementation of Brain- CODE and potential mitigation strategies as required. It will generally: 1. Describe the information flows associated with Brain-CODE (i.e., the anticipated collections, uses, disclosures, retention, destruction and storage of information in Brain-CODE), and comment on whether basic privacy standards are met. 2. Assist OBI in understanding and mitigating any potential privacy challenges associated with the operation of Brain-CODE. 3. Demonstrate OBI s due diligence in using best practice tools to identify and mitigate privacy risks in advance of proceeding with implementation of these new systems. 4. Provide a source of information for key stakeholders, including the Information and Privacy Commissioner/Ontario and future partners including the Institute for Clinical and Evaluative Sciences (ICES). 2.4 Scope of the PIA This PIA is limited to assessing the privacy risks associated with the implementation of Brain-CODE at OBI. As noted above, this PIA does not constitute a PIA of the information systems which interface with Brain-CODE. In addition, this PIA does not constitute a Threat Risk Assessment (TRA) nor Vulnerability Assessment (VA) of these new systems; a Vulnerability Assessment has been conducted and is discussed below (see Safeguards) and a two-step TRA is currently underway (with results of step 1 available by May 2014). 5 The PIA also contemplates the ways in which the risks of re-identification of PHI may be managed. 5 This is in addition to a March 2009 security audit of the HPCVL environment; OBI is cognizant of industry best practices of having a TRA every 5 years. This issue is discussed in greater detail in Safeguards. 10

11 Information for this PIA was obtained from a number of sources including directly from the Project Team (both in written documentation and verbal discussions), 6 a security audit report relating to the HPCVL facilities prepared in March 2009, and ongoing project design and governance analysis. System architecture and certain factual information were derived from documents prepared by InDOC and subsequently confirmed with Moyez Dharsee, InDOC s Director, Informatics. 2.5 Description of Brain-CODE Infrastructure Data Centre Hardware Architecture Computational infrastructure for Brain CODE is provided and maintained by the HPCVL data centre in Kingston, which is part of the Compute Canada HPC consortium. The HPCVL currently supports research teams across Canada, including academic and industry organizations. The Brain CODE data centre provides a robust, scalable, high performance computing platform that can satisfy long term processing and storage requirements of multiple large scale research programs, while enabling secure and seamless open access data sharing. Computing and storage resources are available to the Brain CODE platform to meet known short term requirements, and are scalable to provide additional capacity as demand increases. Currently available resources include: 300 processing cores spanning 30 high end servers capable of running multiple operating systems 300 terabytes of highly available online disk storage, protected by onsite and off site backup to ensure data availability and disaster recovery On demand access to mission critical big iron servers, including access to 9 M9000 systems, each equipped with 64 quad core SPARC VII processors and 2 TB of RAM On demand access to computing servers, including a cluster of 78 Sun Enterprise T5140 servers, each equipped with dual 8 core N2+ processors with 8 threads/core and 32 to 64 GB of RAM 6 The Project Team consists of OBI staff and the InDOC members. 11

12 2.5.2 Description of User Access to Systems Brain-CODE will have three major user groups: Researchers inputting data sets Researchers accessing data sets OCBN staff and agents developing and maintaining Brain-CODE Researchers inputting data sets Researchers access the platform by signing into web-based database applications deployed at Brain-CODE, including Medidata RAVE, OpenClinica Enterprise, SPReD, BASE. Researchers can also access user interfaces for these applications by signing into the Brain-CODE Portal. Clinical assessment data are being entered into electronic case report forms, while neuroimaging and molecular data sets are uploaded in the form of raw data files, as well as processed data files, in pre-defined formats (e.g. DICOM format for MRI data, CEL format for RNA microarray data). Data can also be transferred into Brain- CODE in non-standard or arbitrary file formats (e.g., comma-separated value format), by uploading such files into individual databases using their respective web interfaces, or by uploading them into the Brain-CODE file repository using the Portal web interface. Data dictionaries for all data entered into Brain-CODE systems will be developed. To each subject record or data set entered into Brain-CODE, researchers are required to attach a Subject Identifier (ID) which must be unique at the study level. These Subject IDs enable integration of data sets between data domains stored across multiple database systems. Researchers enter HCNs from consenting research participants into Brain-CODE by using the Subject Registry web application. The Subject Registry implements the encryption algorithm developed at EHIL, providing client-side encryption of HCNs within the researcher s web browser. A Subject ID is also provided and linked with each encrypted HCN, allowing encrypted HCNs to be associated with clinical, neuroimaging and molecular data sets, and allowing these data to be linked, using EHIL secure linkage and comparison tools, with health databases external to OBI. Encrypted HCNs and Subject IDs are stored in the Subject Registry database within the context of the integrated discovery research project (e.g., CP-NET) and research study from which these identifiers were collected. 12

13 The Subject Registry, in coordination with other components of the Brain-CODE Data Integration System (DIS), implements mechanisms for synchronizing Subject IDs across individual database systems. For example, when a Subject ID is entered by a researcher into the SPReD system (together with the subject s neuroimaging data set), this identifier is transmitted to and recorded within the Subject Registry database. The Subject Registry, therefore, is a central repository of all Subject IDs provided by researchers to Brain-CODE. This synchronization allows some level of quality control and reconciliation of subject identifiers to be conducted; for example, if the Subject ID is entered incorrectly into SPReD when uploading a neuroimaging data set for a subject, but is correctly entered into OpenClinica when entering clinical assessment information for the same subject, the Subject Registry will detect and flag the disconnected data sets, and notify Brain-CODE database administrators of this mismatch, who can then follow up with the researcher(s) to follow to correct the error. OCBN staff and agents OCBN staff and agents will have access to Brain-CODE, based on role. In order to minimize the risks associated with this role-based access, OCBN is contractually bound to OBI (and further binds its sub-contractors) to safeguard privacy and security. Confidentiality agreements are also required to be signed. Access to production software systems containing research program information, including demographic and study-level information, is restricted to only designated staff and agents who are required to use such systems to conduct data management duties and/or to provide application-level administration for such systems. Authorization and assignment of role-based access to computer servers and virtual machines is obtained by written request to the Brain-CODE Security Officer. In the interim, it is recommended that OCBN continue with work to develop Information Security Policies, including a policy for access control that would document the existing process to limit access to Brain-CODE to appropriately minimal numbers of staff granted through appropriately managed processes and where access is provided to subcontractors by OCBN, that a vendor/supplier access policy and related procedure is implemented. Recommendations and Responses 13

14 Attached is a table that outlines 27 recommendations for Brain-CODE and the accompanying responses or any actions that have been or will be taken. Where action is required, this PIA will be updated as necessary. 14

15 # Description Rating OBI Response 1 General Statutory Analysis 1. OBI should formally implement a policy that: a requires the inclusion of directly identifiable data elements in Brain-CODE only as necessary (e.g. imaging data where direct and indirect identifiers may not be stripped out). b requires that consent from participants is obtained prior to collection of participant information in Brain- CODE unless an REB waiver is obtained. 2. OBI should implement an agreement with participating health information custodians clarifying OBI s role in the provision of Brain-CODE and requiring health information custodians to agree to the proposed zonebased structures and various roles undertaken by OBI. 3. OBI should consider application for prescribed registry status in the event that: a. The express consent model in current use results in a sufficient rate of consent being declined that the objectives of the research are potentially compromised or, b. Future research objectives require more routine use of PHI under circumstances where it is impractical to obtain consent (the standard review by a research ethics board would apply). Low a - OBI has established an Informatics Governance Policy outlining that directly identifiable elements will be held in Brain-CODE only as necessary and the architecture to allow for the secure transfer, storage, and handling of this data has also be been developed in accordance to the Informatics Governance Policy. b - It is a requirement that any participants from whom data are to be collected and input into Brain-CODE provide express consent (unless in a rare situation an REB has provided for consent waiver). OBI has, as a schedule to the Research Activity Agreement (RAA) with participating Health Information Custodians (HIC), has created a Participation Agreement (PA) that clarifies OBI s role in the provision of Brain-CODE and OBI s activity as a Health Information Network Provider or Electronic Service Provider, as appropriate. As outlined in Section 3.3 and upon signing the RAA and PA, HICs agree to these roles undertaken by the OBI and the zone-based infrastructure. It is anticipated that both Agreements will be signed by March 31 st. At the present time, application for a prescribed registry status is out of OBI s scope. A process to monitor rates of consent is under development; and will be incorporated into future development cycles for the Subject Registry and Portal system. Although prescribed registry status may not be appropriate for OBI at this point, it can be revisited in the future should there be (a) a sufficient rate of declined consent or (b) more routine use of PHI under circumstances where obtaining consent is impractical. Date of Resolution (Actual or Expected) February 2014 March, Process to monitor consents: July To facilitate decision-making regarding application for Medium The ability to monitor consents is in process, as Process to

16 registry status, OBI should monitor from the outset rates of consent in the research studies associated with Brain- CODE and require the disclosure of rates of consent, in de-identified form by researchers to OBI. 5. Mechanisms must be adopted to ensure that no researchers use external data sources to re-identify or seek to decrypt the health card numbers, provisions specifically prohibiting researchers or health information custodians from re-identifying Brain-CODE data sets or linking Brain-CODE data sets with external data sources for this purpose. These mechanisms might include terms in Research Activity Agreements, and other OBI policies and agreements. 2 Accountability 6. OBI should ensure that OCBN and its subcontractors are also contractually restricted from using or disclosing confidential Brain-CODE information and ensure that the contractual requirements for OCBN are at the standard that would be expected and required in the event that the data resident in Brain-CODE is identifiable. 7. In order to ensure that a comprehensive accountability structure is in place, OBI should continue with its policy work and ensure this work is complete and implemented prior to the population of data. 8. OBI should continue to work closely with OCBN to ensure that security and privacy policies, particularly in respect of incident management are aligned and provide described above. At the present time, OBI has concluded that application for prescribed registry status is unnecessary. Mechanisms are put in place for researchers who wish to access data on Brain-CODE for studies that they are not a part of. As per Section in the Informatics Governance Policy, it is prohibited for data users to attempt, by any means, to re-identify participants. This is made explicit in Participation Agreements signed by such external parties, and in a Data Use Agreement that precedes access to any data in Brain-CODE. De-identification tools and the zone-based infrastructure that permits the functional separation of sensitive data have been put in place to minimize the risk of re-identification. The master service level agreement between OBI and OCBN provides for such restrictions under sections Article 13 of subcontracts between OCBN and subcontractors mirrors the master service level agreement sections related to Confidentiality. Subcontractor agreements have been executed. In addition to OBI s general Governance Policy, an Informatics Governance Policy has been developed that comprises five sections: Definitions and Framework, Terms of Reference, Data Sharing Policy, Privacy Policy and Privacy Breach Policy. A Data Use Agreement is in development. The Informatics Governance Policy will continue to be monitored to ensure the required accountability structure is in place. OBI has weekly meetings with OCBN and monthly meetings with the InDOC consortium to ensure alignment and progress. An Information Security monitor consents: July 2014 March, 2014 Data Use Agreement: Under review, to be complete before end of July May 2014 Informatics Governance Policy: February 2014 Data Use Agreement: Under review, to be complete before end of July Meetings with OCBN/InDOC: Ongoing; 16

17 for clear accountability between OBI, OCBN and other members of the InDOC consortium as required. 9. OBI should ensure the implementation of a policy that addresses the requirements of limiting collection and make amendment to research agreements as required. 3 Limiting Use, Disclosure & Retention 10. OBI should conclude and implement the governance framework described above at its earliest opportunity and prior to facilitating access to extracted data sets. 4 Accuracy 11. Use of the probabilistic matching algorithm should be limited to specific purposes with appropriate oversight of the Data Access Committee or the President and Scientific Director. 12. InDOC should conduct extensive data quality testing to ensure that the algorithm is performing as expected to produce accurate matches. Medium Policy has been completed, and is aligned with the Privacy Breach Protocol, which outlines in Sections and the steps that are to be taken by HPCVL in the event of a Privacy Breach. This recommendation has been incorporated into the Participation Agreement and is also reflected in the Privacy Policy as part of the Informatics Governance Policy posted on-line. An Informatics Governance Policy has been completed and posted on OBI s website. A Data Use Agreement will be developed by Spring 2014 before any data can be extracted by third parties. Currently the probabilistic matching algorithm is in development and not in use. Once ready, there will be robust testing and validation carried out and it will be limited to specific purposes only when ready for us. The President and Scientific Director will oversee the implementation of the probabilistic matching algorithm as recommended. Deterministic linkage, which, will be the primary mode of matching has been in use for many years and is an industry standard approach. When used appropriately, there is a 100% match rate. Upon the development of a probabilistic linking algorithm rigorous testing will be conducted to ensure the accuracy of the returned matches. Information Security Policy: completed January, 2013 March, 2014 (signed Participation Agreements) Informatics Governance Policy: Complete. Data Use Agreement: Under review, to be complete before end of July The use of the probabilistic algorithm has been delayed until after the deterministic pilot. Pilot underway, to be completed by September, Safeguards 13. OBI should ensure that the Information Security Policy An Information Security Policy has been completed, 17

18 work is completed prior to population of the platform and further that the security policies align to the ISO security domains. 14. A procedure to ensure timely management of security incidents detected after-hours should be implemented. 15. A policy for sub-contractor access to Brain-CODE either physically or by remote electronic connection should be established. Greater supervision or a policy for determining trusted status should be clarified within the scope of the policy. 16. Appropriate training materials, supported by an appropriate use agreement and related policy should be implemented for researchers prior to access to the Brain-CODE application. 17. A policy for granting access to OCBN personnel should be developed and implemented. 18. A policy for registering and validating users to the platform should be developed and implemented 19. A Threat Risk Assessment should be conducted prior to the population of the Brain-CODE platform. Medium Medium and HPCVL considers the Information Security Policies for Brain-CODE and associated procedures to be adequately aligned with and have sufficient coverage against the security management standards specified in ISO security domains. There will be prompt notification to personnel once detection mechanisms at HPCVL are engaged. Afterhours support is in place, where security breach containment processes will be initiated within 3 hours. This process is outlined in the Privacy Breach Policy, the Information Security Policy and in OBI s contract with OCBN. A policy that outlines sub-contractor access to Brain- CODE is part of the Information Security Policy. A policy for determining trusted status for users of Brain-CODE is also outlined in the Information Security Policy. Users will either be members of the ID Programs, or external users, each of whom will undergo a verification to gain trusted status. All access will be granted and revoked by the Security Officer. Training materials for specific applications used for data entry and data management in Brain-CODE have been developed by InDOC. A separate User s Manual for Brain-CODE and a Data Use Agreement are in development. This has been addressed in the Information Security Policy. All access will be granted and revoked by the Security Officer. A workflow describing the types of users has been developed, and the process by which accounts are validated is outlined in the Information Security Policy. A Threat Risk Assessment (TRA) was carried out at HPCVL in March of 2011, no additions or changes January 2013 January 2013 January 2013 March 2014; training materials developed and provided to users upon training. January 2013 January 2013 Stage 1 completed May 18

19 20. OCBN should establish a password policy and ensure that it is consistently applied across the applications on the Brain-CODE platform. 21. OCBN should consider implementing a Test Environment Policy to ensure that test systems will only contain test data, never actual participant data. 6 Openness 22. OBI should post specific information on its website regarding privacy and security of Brain-CODE and its governance structure. 23. OBI should consider posting a finalized copy of this PIA or a summary of it to the website. 24. OBI should proceed as planned to make available this PIA to the IPC and other stakeholders. 7 Individual Access 25. OBI should ensure that procedures for redirecting access and correction requests are addressed in its policies and agreements with health information Low Medium were requested to how HPCVL conducts business following the completion of this assessment. A second two-stage TRA is currently underway by an independent organization that was recommended for their experience with organizations that handle data of similar sensitivity. The first stage will assess the current state of the system, the second will be carried out at a later date. Thereafter, a TRA will be routinely carried out every few years, and particularly upon a significant change in the security, architecture and/or purposes to which Brain-CODE is put. A general policy on passwords is outlined within the Brain-CODE Access Control Policy in the Information Security Policy. A Development and Test Environment Policy is outlined in the Information Security Policy, which states To the extent possible, only simulated or publicly accessible data will be used for testing of application software. Recommendation accepted. Summaries of the Information Security Policy and TRA will be posted, in addition to the Informatics Governance Policy which currently available online January 2013 January 2013 Information Security Policy Summary and Posted June 2014; we have been advised to not post TRA. Low Recommendation accepted. March 2014 Recommendation accepted. March 2014 This has been included in Section of the Informatics Governance Policy, the informed consent language, and Research Activity Agreements. It is February

20 custodians. 26. OBI should update its website to clarify OBI s role in assisting individuals to address requests for access to their information via the source health information custodian. 8 Challenging Compliance 27. OBI should continue to monitor its policy for managing incidents and complaints and update it as necessary. Low also available on the Brain-CODE web portal. This has also been specifically addressed in the informed consent forms and is outlined in Section of the Informatics Governance Policy. Directions on whom to contact in the event of an incident are listed in Section of the Informatics Governance Policy (Privacy Breach Protocol) and the Information Security Policy. The Informatics Governance Policy as a whole will be amended, as needed. February 2014 Competed February

21

Brain-CODE. Ontario Brain Institute s Integration Platform. April 15 th, 2014

Brain-CODE. Ontario Brain Institute s Integration Platform. April 15 th, 2014 Brain-CODE Ontario Brain Institute s Integration Platform April 15 th, 2014 Ontario Brain Institute (OBI) Values Patient-centred attack salient disorders Maximize neuroscience excellence across Ontario

More information

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2. 1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes

More information

Big Data and Big Privacy in Brain Disorder Research: Changing the System OECD 2013 Donald T. Stuss, PhD, President and Scientific Director

Big Data and Big Privacy in Brain Disorder Research: Changing the System OECD 2013 Donald T. Stuss, PhD, President and Scientific Director Big Data and Big Privacy in Brain Disorder Research: Changing the System OECD 2013 Donald T. Stuss, PhD, President and Scientific Director Ontario Brain Institute June 3, 2013 THEME Gathering big data

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information: Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D. Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides

More information

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices

Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document

More information

Personal Health Information Privacy Policy

Personal Health Information Privacy Policy Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights

More information

Privacy by Design Setting a new standard for privacy certification

Privacy by Design Setting a new standard for privacy certification Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

Privacy and Security Framework, February 2010

Privacy and Security Framework, February 2010 Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and

More information

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design

The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design The Ontario Health Study s Assessment Centres: A Case Study for Privacy by Design Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada and Pamela C. Spencer Cancer Care Ontario VP Corporate

More information

Electronic Health Record Privacy Policies

Electronic Health Record Privacy Policies Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

A Year in Review: CIHI s 2013 2014 Annual Privacy Report

A Year in Review: CIHI s 2013 2014 Annual Privacy Report A Year in Review: CIHI s 2013 2014 Annual Privacy Report Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated

More information

Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010

Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 pic pic Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 Updated March 2013 Our Vision Better data. Better decisions. Healthier

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

Access & Correction Policy

Access & Correction Policy EHR Policies Table of Content 1. Access & Correction Policy.. 2 2. Assurance.. 14 3. Consent Management Policy.. 27 4. Inquiries and Complaints Policy.. 39 5. Logging and Auditing Policy... 51 6. Privacy

More information

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF

More information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1

More information

Strategic Transformation and Mainframe Services Project. Project Summary

Strategic Transformation and Mainframe Services Project. Project Summary Strategic Transformation and Mainframe Services Project Project Summary March 2009 Table of Contents Executive Summary... 3 Background... 4 Procurement Process... 5 The Final Agreement... 5 Benefits...

More information

Accountable Privacy Management in BC s Public Sector

Accountable Privacy Management in BC s Public Sector Accountable Privacy Management in BC s Public Sector Contents Accountable Privacy Management In BC s Public Sector 2 INTRODUCTION 3 What is accountability? 4 Steps to setting up the program 4 A. PRIVACY

More information

INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA

INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada

More information

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health

3/17/2015. Overview HIPAA. Who s Covered? Who s Not Covered? PRIVACY & SECURITY. Regulatory Patchwork: Mobile Health PRIVACY & SECURITY Regulatory Patchwork: Mobile Health Anna Watterson, Davis Wright Tremaine, LLP Overview When HIPAA applies to mobile apps When FTC has jurisdiction over mobile apps Other considerations:

More information

Table of Contents. Page 1

Table of Contents. Page 1 Table of Contents Executive Summary... 2 1 CPSA Interests and Roles in ehealth... 4 1.1 CPSA Endorsement of ehealth... 4 1.2 CPSA Vision for ehealth... 5 1.3 Dependencies... 5 2 ehealth Policies and Trends...

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer

More information

Market Research in the Field v.1

Market Research in the Field v.1 PRIVACY IMPACT ASSESSMENT DECEMBER 10, 2014 Market Research in the Field v.1 Does the CFPB use the information to benefit or make a determination about an individual? No. What is the purpose? Conduct research

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Mission Statement Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance

More information

ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES

ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES OHIT wishes to express its gratitude to Connecting for Health and the Markel Foundation for their work in developing the Common

More information

Strengthening Public Sector Transparency and Privacy

Strengthening Public Sector Transparency and Privacy Strengthening Public Sector Transparency and Privacy Renee Barrette Director of Policy Information and Privacy Commissioner of Ontario AMCTO 2015 Municipal Information Access and Privacy Forum October

More information

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information

More information

BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Request for Comments Docket # 120214135-2135-01

BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Request for Comments Docket # 120214135-2135-01 BEFORE THE DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Request for Comments Docket # 120214135-2135-01 Multistakeholder Process to Develop Consumer Privacy Codes of Conduct COMMENTS

More information

Dartmouth College Merchant Credit Card Policy for Processors

Dartmouth College Merchant Credit Card Policy for Processors Mission Statement Dartmouth College Merchant Credit Card Policy for Processors Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance with the

More information

Health Care Provider Guide

Health Care Provider Guide Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred

More information

Common Student Information System for Schools and School Boards. Project Summary

Common Student Information System for Schools and School Boards. Project Summary for Schools and School Boards May 2007 Table of Contents 1. Executive Summary...... 3 2. Project Background, Rationale, Benefits and Scope... 4 3. Procurement Process... 8 4. The Final Agreement. 10 5.

More information

Information Circular

Information Circular Information Circular Enquiries to: Brooke Smith Senior Policy Officer IC number: 0177/14 Phone number: 9222 0268 Date: March 2014 Supersedes: File No: F-AA-23386 Subject: Practice Code for the Use of Personal

More information

EHR Contributor Agreement

EHR Contributor Agreement This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based

More information

Guidance Specifying Technologies and Methodologies DEPARTMENT OF HEALTH AND HUMAN SERVICES

Guidance Specifying Technologies and Methodologies DEPARTMENT OF HEALTH AND HUMAN SERVICES DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR PARTS 160 and 164 Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable

More information

Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations

Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations Whitepapers on Imaging Infrastructure for Research Paper 1. General Workflow Considerations Bradley J Erickson, Tony Pan, Daniel J Marcus, CTSA Imaging Informatics Working Group Introduction The use of

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014

Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Provincial Laboratory Information Solution (PLIS) and Interoperable Electronic Health Record (iehr) Project Summary. August 2007

Provincial Laboratory Information Solution (PLIS) and Interoperable Electronic Health Record (iehr) Project Summary. August 2007 Provincial Laboratory Information Solution (PLIS) and August 2007 Table of Contents 1. EXECUTIVE SUMMARY...3 Benefits to Healthcare in B.C.... 4 2. PROJECT BACKGROUND, RATIONALE AND SCOPE...4 Background...

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION)

SCHEDULE C to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) SCHEDULE "C" to the MEMORANDUM OF UNDERSTANDING BETWEEN ALBERTA HEALTH SERVICES AND THE ALBERTA MEDICAL ASSOCIATION (CMA ALBERTA DIVISION) ELECTRONIC MEDICAL RECORD INFORMATION EXCHANGE PROTOCOL (AHS AND

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Personal data privacy protection: what mobile apps developers and their clients should know

Personal data privacy protection: what mobile apps developers and their clients should know Personal data privacy protection: what mobile Introduction This technical information leaflet aims to highlight the privacy implications that mobile applications ( mobile apps ) developers (including organisations

More information

Privacy Incident and Breach Management Policy

Privacy Incident and Breach Management Policy Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Smarter Balanced Technology Implementation Readiness v1.1 11 July 2014

Smarter Balanced Technology Implementation Readiness v1.1 11 July 2014 Smarter Balanced Technology Implementation Readiness v1.1 11 July 2014 Release 1.1 Note: The previous version of this document was titled, Smarter Balanced Applications Deployment and Technology Certification

More information

The HIPAA Audit Program

The HIPAA Audit Program The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance

More information

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010 W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

June 25, 2013. Ministry of Health Security enhancement roadmap

June 25, 2013. Ministry of Health Security enhancement roadmap June 25, 2013 Ministry of Health Security enhancement roadmap Table of contents Enhancement roadmap overview... 1 Introduction... 1 Objectives and scope... 1 Approach... 2 Summary of recommended enhancement

More information

INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA

INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA INFORMATION AND PRIVACY COMMISSIONER OF ALBERTA Report of an investigation of a malicious software outbreak affecting health information August 19, 2011 Dr. Cathy MacLean Investigation Report H2011-IR-003

More information

CONSUMER DATA RESEARCH CENTRE DATA SERVICE USER GUIDE. Version: August 2015

CONSUMER DATA RESEARCH CENTRE DATA SERVICE USER GUIDE. Version: August 2015 CONSUMER DATA RESEARCH CENTRE DATA SERVICE USER GUIDE Version: August 2015 Introduction The Consumer Data Research Centre (CDRC or Centre) is an academic led, multi-institution laboratory which discovers,

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

Ann Cavoukian, Ph.D.

Ann Cavoukian, Ph.D. School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Privacy & Security Requirements: from EHRs to PHRs

Privacy & Security Requirements: from EHRs to PHRs Privacy & Security Requirements: from EHRs to PHRs Oct 28, 2010 Presented by André Carrington, P.Eng, CISSP, CISM, CISA, CIPP/C Director, Implementation, Privacy & Security, SPS Purpose As suggested by

More information

Synapse Privacy Policy

Synapse Privacy Policy Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing

More information

Questions and answers for custodians about the Personal Health Information Privacy and Access Act (PHIPAA)

Questions and answers for custodians about the Personal Health Information Privacy and Access Act (PHIPAA) Questions and answers for custodians about the Personal Health Information Privacy and Access Act (PHIPAA) This document provides answers to some frequently asked questions about the The Personal Health

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1

Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1 Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations

More information

STANDARDS OF PRACTICE (2013)

STANDARDS OF PRACTICE (2013) STANDARDS OF PRACTICE (2013) COLLEGE OF ALBERTA PSYCHOLOGISTS STANDARDS OF PRACTICE (2013) 1. INTRODUCTION The Health Professions Act (HPA) authorizes and requires the College of Alberta Psychologists

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

How To Manage Revenue Management In The Province Of Britain Colony

How To Manage Revenue Management In The Province Of Britain Colony MINISTRY OF FINANCE REVENUE SERVICES OF BRITISH COLUMBIA REPORT January - December 2008 Table of Contents Overview... 3 Background... 3 Status Update... 4 Contract Objectives... 5 Implementing a Revenue

More information

Vendor Management Challenge Doing More with Less

Vendor Management Challenge Doing More with Less Vendor Management Challenge Doing More with Less Megan Hertzler Assistant General Counsel Director of Data Privacy Xcel Energy Boris Segalis Partner InfoLawGroup LLP Session ID: GRC-402 Insert presenter

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

Foundation Working Group

Foundation Working Group Foundation Working Group Proposed Recommendations on De-identifying Information for Disclosure to Third Parties The Foundation Working Group (FWG) engaged in discussions around protecting privacy while

More information

Regulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies

Regulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies Meeting Regulatory Compliance Requirements with VERITAS Enterprise Vault and Microsoft Windows Server Technologies Creating an electronic messaging system to meet regulatory compliance requirements can

More information

Ontario Laboratories Information System Electronic Medical Records Initiative. Privacy Impact Assessment Summary

Ontario Laboratories Information System Electronic Medical Records Initiative. Privacy Impact Assessment Summary Ontario Laboratories Information System Electronic Medical Records Initiative Privacy Impact Assessment Summary Copyright Notice Copyright 2011, ehealth Ontario All rights reserved Trademarks No part of

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

National System for Incident Reporting

National System for Incident Reporting National System for Incident Reporting Privacy Impact Assessment The contents of this publication may be reproduced in whole or in part, provided the intended use is for non-commercial purposes and full

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information