Li Xiong, Emory University
|
|
- Gabriella Sutton
- 8 years ago
- Views:
Transcription
1 Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic Database Technology for managing disclosure of private healthcare data and incorporate it into current Computer Science and Biomedical Informatics curriculum at Emory University and the broad healthcare IT community. Motivation and Goal The effective use of information technology is of utmost importance to improve care quality and reduce costs by making the right health information available to the right people at the right time. This requires the capture, storage and flow of electronic health record (EHR) information across a wide range of individuals and organizations. However, disclosure of sensitive health information can have serious personal, professional, and social consequences on individuals. Health care consumers must trust that their sensitive health information will be adequately managed and protected. The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) and establishes standards for individuals privacy rights to understand and control how their health information is used. Many state laws on protection of PHI require security of social security number, driver s license information and credit card data, many of which are often part of health care demographic or billing information. The goal of this project is to design and develop a course focused on the values and principles of the Hippocratic Database Technology for managing disclosure of private healthcare data. The course will be incorporated into current Computer Science and Biomedical Informatics curriculum at Emory University and the course materials will be made available for the broad community to train next generation healthcare IT professionals. Hippocratic Database Technology The Hippocratic Database (HDB) 1 is a set of solutions that can be used to manage disclosure of electronic health records in compliance with data protection laws without impeding the legitimate flow of information. The technology sets include: Active Enforcement (AE) is a disclosure management component that limits disclosure of personal health information at a fine-grained level. It resides in a layer above the database, rewriting user queries in strict accordance with organization policies, legal regulations, and individual patient choices. HDB policy controls are more fine-grained than conventional role-based access controls, as they enforce disclosure policies down to the cell-level in the database, and account for the purpose of access, the intended recipient of the information, and patient consent rights, in addition to the user s access privileges. 1
2 Compliance Auditing (CA) is an auditing system that tracks past disclosures of information and verify whether they complied with applicable laws and policies. Using an audit application over existing database infrastructure, it records all queries and changes to the database and uses this information to construct detailed audit trails that specify the user, recipient, purpose, time, and exact (cell-level) information disclosed for any particular database query. Sovereign Information Integration (SII) enables two or more autonomous organizations to share information about intersections between data sets without compromising the privacy or security of the remaining data. It is a scalable software solution that can be integrated into existing data environments without the need for a trusted third party. Privacy-Preserving Data Mining (PPDM) allows accurate data mining at the aggregate level while preserving privacy at the individual patient level. It uses a randomizing function to perturb sensitive values in a patient s record such that they cannot be estimated with reasonable precision. The original data distribution can be reconstructed from the randomized data to allow data mining at the aggregate level. Order Preserving Encryption enables database systems to execute queries over encrypted data without incurring significant performance hit or unnecessary cryptographic calls and still being able to utilize the existing database functionality. This allows a healthcare provider to securely outsource its sensitive data in an encrypted form to a third party while still supporting queries over the encrypted data. Anonymization enables de-identification of sensitive data that protects the privacy of individual patients, but maintains the value of the data for research purposes. The optimal k-anonymization algorithm finds optimal k-anonymizations that are resistant to data linkage attacks. Other anonymization principles and algorithms have also been developed by the research community to protect against other types of attacks. Approach The course will be focused on the values and principles of the above solutions. The lectures will cover the key algorithms and techniques for each of the above solution components as well as complementary techniques developed by the research community. The design of the course will also feature the following: Case-driven curriculum. Emory University is home to large academic medical centers with substantial investments in information systems technology supporting use of clinical data in healthcare, quality improvement and biomedical research. An Analytical Information Warehouse (AIW) that is currently under development at Emory will form the basis for motivating, studying and evaluating the HDB technology in the contexts of patient care and secondary use of clinical data. Test-bed and dataset development for hands-on learning. In order to demonstrate the concepts and allow students to understand and evaluate the HDB technologies and
3 methods, we will develop a test bed based on AIW. It will implement an application emulation layer consisting of synthetic datasets and parameterized workloads. The synthetic datasets will be developed using real database schemas and synthetic data generated based on the statistical characteristics of the real data. The workloads will consist of parameterized queries and data access requests, and will be developed by working closely with clinicians and clinical research groups at Emory to model their high-level queries and data requests and by monitoring and modeling queries against real databases. It will allow the students to develop use cases, implement policy profiles describing access to the data sets according to attributes assigned to a user, validate and evaluate HDB solutions such as Active Enforcement and Compliance Auditing with scaling of synthetic datasets and workloads for scalability testing and different use cases for usability testing. Multiple instances of the test bed databases hosting different or overlapping data subsets will be hosted on separate networked servers in order to provide a testing environment for HDB solutions such as Sovereign Information Sharing. Skills-driven assignments. A variety of assignments will be designed to build towards the combination of business + IT skills. Reading assignments with written reviews and in-class presentations will build towards creative and critical thinking, analysis and synthesis, and communication skills. Case studies will be designed in collaboration with the clinical research groups at Emory to build towards Healthcare IT best practices, business case development and analysis, as well as critical thinking skills. For example, the students can be provided with some synthetic datasets and play "data detectives" and acquire knowledge from these datasets by identifying individual patients from seemingly anonymous or innocent data. A substantial group project will be designed to build the skills on leadership, collaboration, and teaming, creative and critical thinking, business project management, solution service strategy, design and modeling, and management. Project deliverables will include project proposal, in-class project presentation, project report, and implementation. Benefit Informatics is a discipline that solves problems through the application of computing or computation, in the context of the domain of the problem. 2 The proposed curriculum will equip next generation leaders in the field of biomedical informatics or healthcare IT professionals with the combination of industry and technical skills on the state-of-the-art HDB technology for managing private healthcare data and help realize the healthcare transformation. Resources and Institution Environment Emory University is home to large academic medical centers with substantial investments in information systems technology supporting use of clinical data in healthcare, quality improvement and biomedical research. Concurrently, a number of synergistic events have occurred across campus. The Center for Comprehensive Informatics (CCI) has been established to foster collaborative projects between software system researchers and scientific research groups in clinical and translational research and biomedical 2 D.P. Groth and J.K. MacKie-Mason, Why an Informatics Degree?, Communications of the ACM, February 2010
4 informatics. The Biomedical Informatics Department within the School of Medicine has been proposed and is in planning for training leaders in the field of biomedical informatics. Meanwhile, the new concentration in Biomedical Informatics has been developed and approved within the Ph.D. program of Computer Science and Informatics. This is an unprecedented opportunity for incorporating the HDB and healthcare IT solutions into the Computer Science and Bioinformatics curriculum at Emory in training the next generation of bioinformatics and biomedical informatics researchers and Health IT professionals. Outline Plan and Milestones The proposed curriculum will be designed and fine tuned over a 9 month period and offered in Fall Month 1-3. Develop lecture notes, presentation slides, and reading assignments. Month 4-6. Develop test-bed with synthetic datasets and parameterized workloads, design case studies and group projects. Month 7-9. Fine tune and prepare the course materials including lecture notes, slides, datasets, case studies, and assignments for public releases. Month 10 (Fall 2011). I expect to offer the course as a core elective for the new Biomedical Informatics track within the PhD program in Computer Science & Informatics at Emory and the course modules to be used in part to train Health IT professionals at Emory. Lecturer Bio Dr Li Xiong ( is an Assistant Professor of Computer Science at Emory University and directs the Assured Information Management and Sharing (AIMS) research group ( She is also an affiliated faculty at the Center for Comprehensive Informatics and the Department of Biomedical Informatics currently under planning at Emory. Dr Xiong has a unique combination of background and skills in data privacy and security and health informatics to successfully develop the proposed curriculum. Dr Xiong and her group have substantial research experience in developing models and techniques aimed at enhancing privacy, confidentiality, trust, interoperability, and scalability of distributed information systems in various domains with a particular focus in health information systems. She also has substantial experiences in both developing and teaching undergraduate and graduate courses on database systems, data mining, and data security. Notably, she has developed and offered a course on Data Privacy and Security previously at Emory which covers some of the HDB technologies (the course materials are available online at Dr. Xiong holds a PhD from Georgia Institute of Technology and an MS from Johns Hopkins, both in Computer Science. She worked as a software engineer in IT industry including IBM Internet Security Systems for several years prior to pursuing her doctorate. She has recently been recognized with the prestigious Career Enhancement Fellowship by the Woodrow Wilson Foundation for her academic achievement and potential.
5 Collaborators and Endorsements I will work closely with Dr. Tyrone Grandison at IBM or assigned IBM liaison for the proposed curriculum development. Dr. Grandison leads the Intelligent Information Systems (IIS) team at the IBM Almaden Research Center which pioneered the research on HDB technology and is an expert in how to apply the HDB technology in the Healthcare industry. The close partnership with IBM will ensure the proposed curriculum clearly introduces, defines, and demonstrates the solutions for smarter healthcare and builds towards the combination of business + IT skills needed for next generation leaders in biomedical informatics and Healthcare IT professionals. I will also work closely with Dr. Andrew Post at Emory for developing the test-bed and case studies for introducing and demonstrating HDB solutions. Dr. Post is the Clinical Informatics Architect at the Center for Comprehensive Informatics at Emory and Assistant Professor in the Department of Biomedical Engineering at Emory and Georgia Tech. Dr. Post is faculty lead of the AIW project which forms the basis of the proposed curriculum and is deeply involved in health system and clinical trials information system planning. Working closely with domain experts at Emory will ensure the real impact of the proposed curriculum in demonstrating the HDB solutions for smarter healthcare. The proposed project is endorsed by Dr. Vaidy Sunderam, Professor and Chair of the Department of Mathematics and Computer Science, and Dr. Joel H. Saltz, Director of the Center for Comprehensive Informatics, Professor in the Departments of Pathology, Biostatistics and Bioinformatics, and Mathematics and Computer Science at Emory University, and Chief Medical Information Officer at Emory Healthcare. Thank you.
Enabling the 21st Century HEALTH CARE INFORMATION TECHNOLOGY REVOLUTION
Enabling the 21st Century HEALTH CARE INFORMATION TECHNOLOGY REVOLUTION The U.S. government s vision of the health care information infrastructure is possible using technologies that support the sharing
More informationProvidence- OHSU Informatics Course
Providence- OHSU Course Logistics, Detailed Curriculum, Learning Objectives, and Other Information William Hersh, M.D. Department of Medical & Clinical Epidemiology Oregon Health & Science University Course
More informationPrivacy and Identity Management for Europe
Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information
More informationInformation Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
More informationAn Introduction to Health Informatics for a Global Information Based Society
An Introduction to Health Informatics for a Global Information Based Society A Course proposal for 2010 Healthcare Industry Skills Innovation Award Sponsored by the IBM Academic Initiative submitted by
More informationHIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
More informationDe-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV Tyrone Grandison, PhD Manager, Privacy Research, IBM TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008
More informationEHR Standards Landscape
EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness
More informationPatient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George
More informationVanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary
Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Unique among academic health centers, Vanderbilt University Medical Center entrusts its Informatics Center
More informationHEALTHCARE INFORMATICS
SACRED HEART UNIVERSITY GRADUATE CATALOG 2013-2014 HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, CHAIR & PROGRAM DIRECTOR Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu
More informationAccess Control patient centric selective sharing Emergency Access Information Exchange
Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope:
More informationMaster of Science in Computer Science. Option Health Information Systems
Master of Science in Computer Science Option Health Information Systems 1. The program Currently, in the Lebanese and most of Middle East s hospitals, the management of health information systems is handled
More informationDistributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
More informationThe Department of Public Health Sciences
The Department of Public Health Sciences Who we are at the U.Va. School of Medicine Committed to improving population health and clinical care The Department of Public Health Sciences, established in 1995,
More informationHEALTHCARE INFORMATION SYSTEMS
SACRED HEART UNIVERSITY GRADUATE CATALOG 2012-2013 HEALTHCARE INFORMATION SYSTEMS STEPHEN C. BURROWS, DPM, MBA Chair & Program Director, Healthcare Information Systems Phone: 203-416-3948 Fax: 203-416-3951
More informationHEALTHCARE INFORMATICS
HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, CPHIT, CHAIR & PROGRAM DIRECTOR Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu Overview/Rationale This interdisciplinary
More informationBIOMEDICAL INFORMATICS Doctor of Philosophy
BIOMEDICAL INFORMATICS Doctor of Philosophy The PhD Program in Biomedical Informatics at the University of Cincinnati (UC) leverages partnerships between three leading institutions: Cincinnati Children
More informationDATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationHEALTH INFORMATICS PROGRAM SCHOOL OF INFORMATICS. Request for a New Graduate Minor. To be offered at Indiana University-Purdue University Indianapolis
HEALTH INFORMATICS PROGRAM SCHOOL OF INFORMATICS Request for a New Graduate Minor To be offered at Indiana University-Purdue University Indianapolis Approved by the HI program faculty on October 17, 2012
More informationTowards Smarter Healthcare: New Healthcare IT Curriculum
Towards Smarter Healthcare: New Healthcare IT Curriculum Praveen R. Rao, University of Missouri-Kansas City Email: raopr@umkc.edu, Web page: http://r.web.umkc.edu/raopr Abstract We propose to develop new
More informationStudent Orientation. Department of Health Informatics SHRP-UMDNJ
Student Orientation Department of Health Informatics SHRP-UMDNJ OUR DEGREES Healthcare Informatics Certificate: designed to quickly build up competencies in the field of biomedical informatics useful for
More informationBS Environmental Science (2013-2014)
BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan (brian.morgan@marshall.edu) Support for University and College Missions Marshall University is a multi-campus public
More informationHealth Informatics Student Handbook
Health Informatics Student Handbook Interdisciplinary Graduate Program in Informatics (IGPI) Please see the Interdisciplinary Graduate Program in Informatics Handbook for more information regarding our
More informationCOMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES
COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES School of Computing and Information Sciences Florida International University Slides Prepared by: Vagelis Hristidis (CS Assistant
More informationRFI Summary: Executive Summary
RFI Summary: Executive Summary On February 20, 2013, the NIH issued a Request for Information titled Training Needs In Response to Big Data to Knowledge (BD2K) Initiative. The response was large, with
More informationMaster s of Science in Biostatistics
Master s of Science in Biostatistics Program Director: Administrative Assistant: Department: Website: K.B. Kulasekera, Ph.D. Lynne C. Dosker Bioinformatics and Biostatistics MS in Biostatistics Introduction
More informationCS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
More informationUniversity of New Mexico Health Sciences Library and Informatics Center Biomedical Informatics Fellowship Curriculum Specification
University of New Mexico Health Sciences Library and Informatics Center Biomedical Informatics Fellowship Curriculum Specification Key to Competency Level Each of the competencies listed is designed to
More informationProgram Overview. Updated 06/13
Program Overview Computing systems and technologies have become increasingly essential for modern practice of medicine, pharmaceutical and clinical research, efficient and effective management of health
More informationDegrees of De-identification of Clinical Research Data
Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal
More informationThe Use of Patient Records (EHR) for Research
The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The
More informationAnonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics
Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics Privacy Analytics - Overview For organizations that want to safeguard and enable their
More informationSecurity Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
More informationPh.D. in Bioinformatics and Computational Biology Degree Requirements
Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;
More informationSocietal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo
Privacy Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo Kassaye Yitbarek Yigzaw UiT The Arctic University of Norway Outline
More informationProgram Overview. Updated 06/13
Program Overview Biomedical Informatics is an interdisciplinary science that involves both the conceptual and practical tools from diverse disciplines for the understanding, invention, generation and propagation
More informationProfessional Education for the Future of Health Informatics. Charles P. Friedman, PhD Schools of Information and Public Health University of Michigan
Professional Education for the Future of Health Informatics Charles P. Friedman, PhD Schools of Information and Public Health University of Michigan 1 Today s Menu What informatics is and isn t Informatics
More informationHIC 2009 Workshop Introduction to Health Informatics
HIC 2009 Workshop Introduction to Health Informatics Part 2: Knowledge Domain & Educational Options Professor Anthony Maeder University of Western Sydney Health Informatics Knowledge Domain Perspectives
More informationHEALTHCARE INFORMATICS
HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, FHIMSS, CPHIT CHAIR, HEALTH SCIENCE & LEADERSHIP PROGRAM DIRECTOR, HEALTHCARE INFORMATICS Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu
More informationehealth Competencies for Undergraduate Medical Education
ehealth Competencies for Undergraduate Medical Education Created by The Association of Faculties of Medicine of Canada in Partnership with Canada Health Infoway, May 2014 Contents Contents Acknowledgements...
More informationA Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University
A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service
More informationBusiness Intelligence for Healthcare Benefits
Business Intelligence for Healthcare Benefits A whitepaper with technical details on the value of using advanced data analytics to reduce the cost of healthcare benefits for self-insured companies. Business
More informationEMR Systems and the Conduct of Clinical Research. Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine
EMR Systems and the Conduct of Clinical Research Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine Clinical Research Environment Research protocols are becoming
More informationResearch Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on
Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Lucila Ohno-Machado, MD, PhD Division of Biomedical Informatics University of California San Diego PCORI Workshop 7/2/12
More informationPosition Specification
(UK) Position Specification Lexington, Kentucky POSITION ORGANIZATION LOCATION (UK) Lexington, KY REPORTING RELATIONSHIPS Executive Vice President for Health Affairs Provost POSITION DESCRIPTION The Center
More informationPublic Health 101 Series
Public Health 101 Series Introduction to Public Health Informatics Instructor name Title Organization Note: This slide set is in the public domain and may be customized as needed by the user for informational
More informationDesign and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse
Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse Shelley A. Rusincovitch, Sohayla Pruitt, MS, Rebecca Gray, DPhil, Kevin Li, PhD, Monique
More informationStatistics in Applications III. Distribution Theory and Inference
2.2 Master of Science Degrees The Department of Statistics at FSU offers three different options for an MS degree. 1. The applied statistics degree is for a student preparing for a career as an applied
More informationData Privacy and Biomedicine Syllabus - Page 1 of 6
Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. (b.malin@vanderbilt.edu) Semester: Spring 2015 Time: Mondays
More informationHIPAA Training 2010. For Research Investigators and Study Staff
HIPAA Training 2010 For Research Investigators and Study Staff HIPAA IS... THE HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 Portability Created to ensure access to health coverage Allows for
More informationPrivacy Preserved Association Rule Mining For Attack Detection and Prevention
Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationTowards Privacy aware Big Data analytics
Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy
More informationSix Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois
Six Challenges for the Privacy and Security of Health Information Carl A. Gunter University of Illinois The Six Challenges 1. Access controls and audit 2. Encryption and trusted base 3. Automated policy
More informationHealth Informatics. Dr. Gopalrao Jogdand, M.D. Ph.D. Professor & Head, Department of community medicine
Health Informatics Dr. Gopalrao Jogdand, M.D. Ph.D. Professor & Head, Department of community medicine Goals for this presentation Explore the state of development in health informatics and health care
More informationThe HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.
The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery
More informationDeborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS
Health Information Technology and Privilege Management A Policy Agenda for Progress Deborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS All material
More informationDEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
More informationMS Health Informatics (2014 2015)
MS Health Informatics (2014 2015) Program Information Point of Contact Girmay Berhie (berhie@marshall.edu) Support for University and College Missions Marshall University is a multi campus public university
More informationIowa Student Loan Online Privacy Statement
Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of
More informationCloud Data Security. Sol Cates CSO @solcates scates@vormetric.com
Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric
More informationOverview of Information Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Information Security Murat Kantarcioglu Pag. 1 Purdue University Outline Information Security: basic concepts Privacy: basic
More informationTelecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
More informationHOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD
HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD DEFINITION OF BIG DATA Big data is a broad term for data sets so large or complex that traditional data processing applications
More informationFACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES
FACULTY OF CONTEMPORARY SCIENCES AND TECHNOLOGIES STUDY PROGRAMME FOR POSTGRADUATE STUDIES (Master of Science) NAME OF THE PROGRAMME: BUSINESS INFORMATICS STUDIES 262 PROGRAMME DESCRIPTION Business Informatics
More informationState of Utah Version of Document E203 2013
State of Utah Version of Document E203 2013 Building Information Modeling and Digital Data Exhibit VBS Project Edition This version of AIA Document E203 2013 is modified by the State of Utah. Publication
More informationEstablishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced
Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Several of the faculty of the School of Natural Sciences have planned the formation of a Bylaw 55 unit in Applied Mathematics. The case
More informationBachelor Degree in Informatics Engineering Master courses
Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationTertiary Use of Electronic Health Record Data. Maggie Lohnes, RN, CPHIMS, FHIMSS VP Provider Relations Anolinx, LLC October 26, 2015
Tertiary Use of Electronic Health Record Data Maggie Lohnes, RN, CPHIMS, FHIMSS VP Provider Relations Anolinx, LLC October 26, 2015 Disclosure of Conflicts of Interest No relevant conflicts of interest
More informationDirector, Office of Health IT and e Health; State Government HIT Coordinator. Deputy Director, Office of Health IT and e Health
Assignment Location: Minnesota Department of Health St. Paul, Minnesota Primary Mentor: Secondary Mentor: Martin LaVenture, PhD, MPH, FACMI Director, Office of Health IT and e Health; State Government
More informationHow To Use Zato Health Interoperability Platform Software On A Patient Record
STATE OF CONNECTICUT State Innovation Model Health Information Technology (HIT) Council 2 nd Submission: Zato Follow up Questions 1) Is Zato able to provide a healthcare demonstration of their de-identified
More informationDATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationA bright picture for biomedical informatics in the 21 st century
Biomedical Informatics: Improving Health, Healthcare, and Biomedical Research with Information Technology William Hersh, MD Professor and Chair Department of Medical Informatics & Clinical Epidemiology
More informationUNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
More informationIntegrated Project Delivery Systems
Building Construction Graduate Program Integrated Project Delivery Systems B u i l d i n g C o n s t r u c t i o n at G e o r g i a T e c h www.coa.gatech.edu/bc Welcome from the Director Thank you for
More informationA Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC
A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC De-ID Data Corp, LLC Founded to: ENHANCE DATA ACCESS WHILE PROTECTING PATIENT PRIVACY Founders Problem
More informationSecure Sharing of Electronic Medical Records in Cloud Computing
Secure Sharing of Electronic Medical Records in Cloud Computing MS Thesis Defense: Ruoyu Wu Graduate Supervisory Committee: Dr. Gail-Joon Ahn, Chair Dr. Sik-Sang Yau Dr. Dijiang Huang The Laboratory of
More informationA Secure Model for Medical Data Sharing
International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,
More informationOUTLINE FOR AN INTERDISCIPLINARY CERTIFICATE PROGRAM
OUTLINE FOR AN INTERDISCIPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 30, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:
More informationAuthorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
More informationMaster of Science in Healthcare Informatics and Analytics Program Overview
Master of Science in Healthcare Informatics and Analytics Program Overview The program is a 60 credit, 100 week course of study that is designed to graduate students who: Understand and can apply the appropriate
More informationRUTGERS POLICY. Responsible Office: RBHS Office of Ethics, Compliance & Corporate Integrity
RUTGERS POLICY Section: 100.1.3 Section Title: HIPAA Policies Policy Name: Accounting Disclosures of Health Information Formerly Book: 00-01-15-20:00 Approval Authority: RBHS Chancellor Responsible Executive:
More information1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.
1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes
More informationCALIFORNIA STATE UNIVERSITY, EAST BAY
CALIFORNIA STATE UNIVERSITY, EAST BAY First Quarter/Year of Offering Quarter: FALL Year: 2013 Date Submitted to APGS:12/6/12 Catalog: SELF SUPPORT (2014-15) REQUEST FOR APPROVAL OF NEW CERTIFICATE, OR
More informationHow to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
More informationImplementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience
Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience Christopher Ryan, Ph.D., CIP IRB Director Professor of Psychiatry University of Pittsburgh ryancm@upmc.edu The
More informationDEGREE/PROGRAM CHANGE FORM C Form Number: C1817. Name of Initiator: Donald Godwin Email: dgodwin@unm.edu Phone Number: 505 272-0907 Date: 11-24-2015
DEGREE/PROGRAM CHANGE FORM C Form Number: C1817 Fields marked with * are required Name of Initiator: Donald Godwin Email: dgodwin@unm.edu Phone Number: 505 272-0907 Date: 11-24-2015 Associated Forms exist?
More informationIdentity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
More informationWelcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information
Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationHow To Help Your Health Care Provider With A Health Care Information Technology Bill
875 Greentree Road Pittsburgh, PA 15220 QuestDiagnostics.com Quest Diagnostics Statement on the Pennsylvania Health Information Technology Act (Senate Bill 8) to the Senate Communications & Technology
More informationMaster of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
More information