Li Xiong, Emory University

Size: px
Start display at page:

Download "Li Xiong, Emory University"

Transcription

1 Healthcare Industry Skills Innovation Award Proposal Hippocratic Database Technology Li Xiong, Emory University I propose to design and develop a course focused on the values and principles of the Hippocratic Database Technology for managing disclosure of private healthcare data and incorporate it into current Computer Science and Biomedical Informatics curriculum at Emory University and the broad healthcare IT community. Motivation and Goal The effective use of information technology is of utmost importance to improve care quality and reduce costs by making the right health information available to the right people at the right time. This requires the capture, storage and flow of electronic health record (EHR) information across a wide range of individuals and organizations. However, disclosure of sensitive health information can have serious personal, professional, and social consequences on individuals. Health care consumers must trust that their sensitive health information will be adequately managed and protected. The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) and establishes standards for individuals privacy rights to understand and control how their health information is used. Many state laws on protection of PHI require security of social security number, driver s license information and credit card data, many of which are often part of health care demographic or billing information. The goal of this project is to design and develop a course focused on the values and principles of the Hippocratic Database Technology for managing disclosure of private healthcare data. The course will be incorporated into current Computer Science and Biomedical Informatics curriculum at Emory University and the course materials will be made available for the broad community to train next generation healthcare IT professionals. Hippocratic Database Technology The Hippocratic Database (HDB) 1 is a set of solutions that can be used to manage disclosure of electronic health records in compliance with data protection laws without impeding the legitimate flow of information. The technology sets include: Active Enforcement (AE) is a disclosure management component that limits disclosure of personal health information at a fine-grained level. It resides in a layer above the database, rewriting user queries in strict accordance with organization policies, legal regulations, and individual patient choices. HDB policy controls are more fine-grained than conventional role-based access controls, as they enforce disclosure policies down to the cell-level in the database, and account for the purpose of access, the intended recipient of the information, and patient consent rights, in addition to the user s access privileges. 1

2 Compliance Auditing (CA) is an auditing system that tracks past disclosures of information and verify whether they complied with applicable laws and policies. Using an audit application over existing database infrastructure, it records all queries and changes to the database and uses this information to construct detailed audit trails that specify the user, recipient, purpose, time, and exact (cell-level) information disclosed for any particular database query. Sovereign Information Integration (SII) enables two or more autonomous organizations to share information about intersections between data sets without compromising the privacy or security of the remaining data. It is a scalable software solution that can be integrated into existing data environments without the need for a trusted third party. Privacy-Preserving Data Mining (PPDM) allows accurate data mining at the aggregate level while preserving privacy at the individual patient level. It uses a randomizing function to perturb sensitive values in a patient s record such that they cannot be estimated with reasonable precision. The original data distribution can be reconstructed from the randomized data to allow data mining at the aggregate level. Order Preserving Encryption enables database systems to execute queries over encrypted data without incurring significant performance hit or unnecessary cryptographic calls and still being able to utilize the existing database functionality. This allows a healthcare provider to securely outsource its sensitive data in an encrypted form to a third party while still supporting queries over the encrypted data. Anonymization enables de-identification of sensitive data that protects the privacy of individual patients, but maintains the value of the data for research purposes. The optimal k-anonymization algorithm finds optimal k-anonymizations that are resistant to data linkage attacks. Other anonymization principles and algorithms have also been developed by the research community to protect against other types of attacks. Approach The course will be focused on the values and principles of the above solutions. The lectures will cover the key algorithms and techniques for each of the above solution components as well as complementary techniques developed by the research community. The design of the course will also feature the following: Case-driven curriculum. Emory University is home to large academic medical centers with substantial investments in information systems technology supporting use of clinical data in healthcare, quality improvement and biomedical research. An Analytical Information Warehouse (AIW) that is currently under development at Emory will form the basis for motivating, studying and evaluating the HDB technology in the contexts of patient care and secondary use of clinical data. Test-bed and dataset development for hands-on learning. In order to demonstrate the concepts and allow students to understand and evaluate the HDB technologies and

3 methods, we will develop a test bed based on AIW. It will implement an application emulation layer consisting of synthetic datasets and parameterized workloads. The synthetic datasets will be developed using real database schemas and synthetic data generated based on the statistical characteristics of the real data. The workloads will consist of parameterized queries and data access requests, and will be developed by working closely with clinicians and clinical research groups at Emory to model their high-level queries and data requests and by monitoring and modeling queries against real databases. It will allow the students to develop use cases, implement policy profiles describing access to the data sets according to attributes assigned to a user, validate and evaluate HDB solutions such as Active Enforcement and Compliance Auditing with scaling of synthetic datasets and workloads for scalability testing and different use cases for usability testing. Multiple instances of the test bed databases hosting different or overlapping data subsets will be hosted on separate networked servers in order to provide a testing environment for HDB solutions such as Sovereign Information Sharing. Skills-driven assignments. A variety of assignments will be designed to build towards the combination of business + IT skills. Reading assignments with written reviews and in-class presentations will build towards creative and critical thinking, analysis and synthesis, and communication skills. Case studies will be designed in collaboration with the clinical research groups at Emory to build towards Healthcare IT best practices, business case development and analysis, as well as critical thinking skills. For example, the students can be provided with some synthetic datasets and play "data detectives" and acquire knowledge from these datasets by identifying individual patients from seemingly anonymous or innocent data. A substantial group project will be designed to build the skills on leadership, collaboration, and teaming, creative and critical thinking, business project management, solution service strategy, design and modeling, and management. Project deliverables will include project proposal, in-class project presentation, project report, and implementation. Benefit Informatics is a discipline that solves problems through the application of computing or computation, in the context of the domain of the problem. 2 The proposed curriculum will equip next generation leaders in the field of biomedical informatics or healthcare IT professionals with the combination of industry and technical skills on the state-of-the-art HDB technology for managing private healthcare data and help realize the healthcare transformation. Resources and Institution Environment Emory University is home to large academic medical centers with substantial investments in information systems technology supporting use of clinical data in healthcare, quality improvement and biomedical research. Concurrently, a number of synergistic events have occurred across campus. The Center for Comprehensive Informatics (CCI) has been established to foster collaborative projects between software system researchers and scientific research groups in clinical and translational research and biomedical 2 D.P. Groth and J.K. MacKie-Mason, Why an Informatics Degree?, Communications of the ACM, February 2010

4 informatics. The Biomedical Informatics Department within the School of Medicine has been proposed and is in planning for training leaders in the field of biomedical informatics. Meanwhile, the new concentration in Biomedical Informatics has been developed and approved within the Ph.D. program of Computer Science and Informatics. This is an unprecedented opportunity for incorporating the HDB and healthcare IT solutions into the Computer Science and Bioinformatics curriculum at Emory in training the next generation of bioinformatics and biomedical informatics researchers and Health IT professionals. Outline Plan and Milestones The proposed curriculum will be designed and fine tuned over a 9 month period and offered in Fall Month 1-3. Develop lecture notes, presentation slides, and reading assignments. Month 4-6. Develop test-bed with synthetic datasets and parameterized workloads, design case studies and group projects. Month 7-9. Fine tune and prepare the course materials including lecture notes, slides, datasets, case studies, and assignments for public releases. Month 10 (Fall 2011). I expect to offer the course as a core elective for the new Biomedical Informatics track within the PhD program in Computer Science & Informatics at Emory and the course modules to be used in part to train Health IT professionals at Emory. Lecturer Bio Dr Li Xiong ( is an Assistant Professor of Computer Science at Emory University and directs the Assured Information Management and Sharing (AIMS) research group ( She is also an affiliated faculty at the Center for Comprehensive Informatics and the Department of Biomedical Informatics currently under planning at Emory. Dr Xiong has a unique combination of background and skills in data privacy and security and health informatics to successfully develop the proposed curriculum. Dr Xiong and her group have substantial research experience in developing models and techniques aimed at enhancing privacy, confidentiality, trust, interoperability, and scalability of distributed information systems in various domains with a particular focus in health information systems. She also has substantial experiences in both developing and teaching undergraduate and graduate courses on database systems, data mining, and data security. Notably, she has developed and offered a course on Data Privacy and Security previously at Emory which covers some of the HDB technologies (the course materials are available online at Dr. Xiong holds a PhD from Georgia Institute of Technology and an MS from Johns Hopkins, both in Computer Science. She worked as a software engineer in IT industry including IBM Internet Security Systems for several years prior to pursuing her doctorate. She has recently been recognized with the prestigious Career Enhancement Fellowship by the Woodrow Wilson Foundation for her academic achievement and potential.

5 Collaborators and Endorsements I will work closely with Dr. Tyrone Grandison at IBM or assigned IBM liaison for the proposed curriculum development. Dr. Grandison leads the Intelligent Information Systems (IIS) team at the IBM Almaden Research Center which pioneered the research on HDB technology and is an expert in how to apply the HDB technology in the Healthcare industry. The close partnership with IBM will ensure the proposed curriculum clearly introduces, defines, and demonstrates the solutions for smarter healthcare and builds towards the combination of business + IT skills needed for next generation leaders in biomedical informatics and Healthcare IT professionals. I will also work closely with Dr. Andrew Post at Emory for developing the test-bed and case studies for introducing and demonstrating HDB solutions. Dr. Post is the Clinical Informatics Architect at the Center for Comprehensive Informatics at Emory and Assistant Professor in the Department of Biomedical Engineering at Emory and Georgia Tech. Dr. Post is faculty lead of the AIW project which forms the basis of the proposed curriculum and is deeply involved in health system and clinical trials information system planning. Working closely with domain experts at Emory will ensure the real impact of the proposed curriculum in demonstrating the HDB solutions for smarter healthcare. The proposed project is endorsed by Dr. Vaidy Sunderam, Professor and Chair of the Department of Mathematics and Computer Science, and Dr. Joel H. Saltz, Director of the Center for Comprehensive Informatics, Professor in the Departments of Pathology, Biostatistics and Bioinformatics, and Mathematics and Computer Science at Emory University, and Chief Medical Information Officer at Emory Healthcare. Thank you.

Enabling the 21st Century HEALTH CARE INFORMATION TECHNOLOGY REVOLUTION

Enabling the 21st Century HEALTH CARE INFORMATION TECHNOLOGY REVOLUTION Enabling the 21st Century HEALTH CARE INFORMATION TECHNOLOGY REVOLUTION The U.S. government s vision of the health care information infrastructure is possible using technologies that support the sharing

More information

Providence- OHSU Informatics Course

Providence- OHSU Informatics Course Providence- OHSU Course Logistics, Detailed Curriculum, Learning Objectives, and Other Information William Hersh, M.D. Department of Medical & Clinical Epidemiology Oregon Health & Science University Course

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

An Introduction to Health Informatics for a Global Information Based Society

An Introduction to Health Informatics for a Global Information Based Society An Introduction to Health Informatics for a Global Information Based Society A Course proposal for 2010 Healthcare Industry Skills Innovation Award Sponsored by the IBM Academic Initiative submitted by

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

De-Identification of Clinical Data

De-Identification of Clinical Data De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV Tyrone Grandison, PhD Manager, Privacy Research, IBM TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008

More information

EHR Standards Landscape

EHR Standards Landscape EHR Standards Landscape Dr Dipak Kalra Centre for Health Informatics and Multiprofessional Education (CHIME) University College London d.kalra@chime.ucl.ac.uk A trans-national ehealth Infostructure Wellness

More information

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George

More information

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary

Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Vanderbilt University Biomedical Informatics Graduate Program (VU-BMIP) Proposal Executive Summary Unique among academic health centers, Vanderbilt University Medical Center entrusts its Informatics Center

More information

HEALTHCARE INFORMATICS

HEALTHCARE INFORMATICS SACRED HEART UNIVERSITY GRADUATE CATALOG 2013-2014 HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, CHAIR & PROGRAM DIRECTOR Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu

More information

Access Control patient centric selective sharing Emergency Access Information Exchange

Access Control patient centric selective sharing Emergency Access Information Exchange Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope:

More information

Master of Science in Computer Science. Option Health Information Systems

Master of Science in Computer Science. Option Health Information Systems Master of Science in Computer Science Option Health Information Systems 1. The program Currently, in the Lebanese and most of Middle East s hospitals, the management of health information systems is handled

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

The Department of Public Health Sciences

The Department of Public Health Sciences The Department of Public Health Sciences Who we are at the U.Va. School of Medicine Committed to improving population health and clinical care The Department of Public Health Sciences, established in 1995,

More information

HEALTHCARE INFORMATION SYSTEMS

HEALTHCARE INFORMATION SYSTEMS SACRED HEART UNIVERSITY GRADUATE CATALOG 2012-2013 HEALTHCARE INFORMATION SYSTEMS STEPHEN C. BURROWS, DPM, MBA Chair & Program Director, Healthcare Information Systems Phone: 203-416-3948 Fax: 203-416-3951

More information

HEALTHCARE INFORMATICS

HEALTHCARE INFORMATICS HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, CPHIT, CHAIR & PROGRAM DIRECTOR Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu Overview/Rationale This interdisciplinary

More information

BIOMEDICAL INFORMATICS Doctor of Philosophy

BIOMEDICAL INFORMATICS Doctor of Philosophy BIOMEDICAL INFORMATICS Doctor of Philosophy The PhD Program in Biomedical Informatics at the University of Cincinnati (UC) leverages partnerships between three leading institutions: Cincinnati Children

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

HEALTH INFORMATICS PROGRAM SCHOOL OF INFORMATICS. Request for a New Graduate Minor. To be offered at Indiana University-Purdue University Indianapolis

HEALTH INFORMATICS PROGRAM SCHOOL OF INFORMATICS. Request for a New Graduate Minor. To be offered at Indiana University-Purdue University Indianapolis HEALTH INFORMATICS PROGRAM SCHOOL OF INFORMATICS Request for a New Graduate Minor To be offered at Indiana University-Purdue University Indianapolis Approved by the HI program faculty on October 17, 2012

More information

Towards Smarter Healthcare: New Healthcare IT Curriculum

Towards Smarter Healthcare: New Healthcare IT Curriculum Towards Smarter Healthcare: New Healthcare IT Curriculum Praveen R. Rao, University of Missouri-Kansas City Email: raopr@umkc.edu, Web page: http://r.web.umkc.edu/raopr Abstract We propose to develop new

More information

Student Orientation. Department of Health Informatics SHRP-UMDNJ

Student Orientation. Department of Health Informatics SHRP-UMDNJ Student Orientation Department of Health Informatics SHRP-UMDNJ OUR DEGREES Healthcare Informatics Certificate: designed to quickly build up competencies in the field of biomedical informatics useful for

More information

BS Environmental Science (2013-2014)

BS Environmental Science (2013-2014) BS Environmental Science (2013-2014) Program Information Point of Contact Brian M. Morgan (brian.morgan@marshall.edu) Support for University and College Missions Marshall University is a multi-campus public

More information

Health Informatics Student Handbook

Health Informatics Student Handbook Health Informatics Student Handbook Interdisciplinary Graduate Program in Informatics (IGPI) Please see the Interdisciplinary Graduate Program in Informatics Handbook for more information regarding our

More information

COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES

COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES COMPUTER SCIENCE: MISCONCEPTIONS, CAREER PATHS AND RESEARCH CHALLENGES School of Computing and Information Sciences Florida International University Slides Prepared by: Vagelis Hristidis (CS Assistant

More information

RFI Summary: Executive Summary

RFI Summary: Executive Summary RFI Summary: Executive Summary On February 20, 2013, the NIH issued a Request for Information titled Training Needs In Response to Big Data to Knowledge (BD2K) Initiative. The response was large, with

More information

Master s of Science in Biostatistics

Master s of Science in Biostatistics Master s of Science in Biostatistics Program Director: Administrative Assistant: Department: Website: K.B. Kulasekera, Ph.D. Lynne C. Dosker Bioinformatics and Biostatistics MS in Biostatistics Introduction

More information

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure

More information

University of New Mexico Health Sciences Library and Informatics Center Biomedical Informatics Fellowship Curriculum Specification

University of New Mexico Health Sciences Library and Informatics Center Biomedical Informatics Fellowship Curriculum Specification University of New Mexico Health Sciences Library and Informatics Center Biomedical Informatics Fellowship Curriculum Specification Key to Competency Level Each of the competencies listed is designed to

More information

Program Overview. Updated 06/13

Program Overview. Updated 06/13 Program Overview Computing systems and technologies have become increasingly essential for modern practice of medicine, pharmaceutical and clinical research, efficient and effective management of health

More information

Degrees of De-identification of Clinical Research Data

Degrees of De-identification of Clinical Research Data Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal

More information

The Use of Patient Records (EHR) for Research

The Use of Patient Records (EHR) for Research The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The

More information

Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics

Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics Privacy Analytics - Overview For organizations that want to safeguard and enable their

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

Ph.D. in Bioinformatics and Computational Biology Degree Requirements

Ph.D. in Bioinformatics and Computational Biology Degree Requirements Ph.D. in Bioinformatics and Computational Biology Degree Requirements Credits Students pursuing the doctoral degree in BCB must complete a minimum of 90 credits of relevant work beyond the bachelor s degree;

More information

Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo

Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo Privacy Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo Kassaye Yitbarek Yigzaw UiT The Arctic University of Norway Outline

More information

Program Overview. Updated 06/13

Program Overview. Updated 06/13 Program Overview Biomedical Informatics is an interdisciplinary science that involves both the conceptual and practical tools from diverse disciplines for the understanding, invention, generation and propagation

More information

Professional Education for the Future of Health Informatics. Charles P. Friedman, PhD Schools of Information and Public Health University of Michigan

Professional Education for the Future of Health Informatics. Charles P. Friedman, PhD Schools of Information and Public Health University of Michigan Professional Education for the Future of Health Informatics Charles P. Friedman, PhD Schools of Information and Public Health University of Michigan 1 Today s Menu What informatics is and isn t Informatics

More information

HIC 2009 Workshop Introduction to Health Informatics

HIC 2009 Workshop Introduction to Health Informatics HIC 2009 Workshop Introduction to Health Informatics Part 2: Knowledge Domain & Educational Options Professor Anthony Maeder University of Western Sydney Health Informatics Knowledge Domain Perspectives

More information

HEALTHCARE INFORMATICS

HEALTHCARE INFORMATICS HEALTHCARE INFORMATICS STEPHEN C. BURROWS, DPM, MBA, CPHIMS, FHIMSS, CPHIT CHAIR, HEALTH SCIENCE & LEADERSHIP PROGRAM DIRECTOR, HEALTHCARE INFORMATICS Phone: 203-416-3948 Fax: 203-416-3951 Email: burrowss@sacredheart.edu

More information

ehealth Competencies for Undergraduate Medical Education

ehealth Competencies for Undergraduate Medical Education ehealth Competencies for Undergraduate Medical Education Created by The Association of Faculties of Medicine of Canada in Partnership with Canada Health Infoway, May 2014 Contents Contents Acknowledgements...

More information

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University

A Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service

More information

Business Intelligence for Healthcare Benefits

Business Intelligence for Healthcare Benefits Business Intelligence for Healthcare Benefits A whitepaper with technical details on the value of using advanced data analytics to reduce the cost of healthcare benefits for self-insured companies. Business

More information

EMR Systems and the Conduct of Clinical Research. Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine

EMR Systems and the Conduct of Clinical Research. Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine EMR Systems and the Conduct of Clinical Research Daniel E Ford, MD, MPH Vice Dean for Clinical Investigation Johns Hopkins School of Medicine Clinical Research Environment Research protocols are becoming

More information

Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on

Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Lucila Ohno-Machado, MD, PhD Division of Biomedical Informatics University of California San Diego PCORI Workshop 7/2/12

More information

Position Specification

Position Specification (UK) Position Specification Lexington, Kentucky POSITION ORGANIZATION LOCATION (UK) Lexington, KY REPORTING RELATIONSHIPS Executive Vice President for Health Affairs Provost POSITION DESCRIPTION The Center

More information

Public Health 101 Series

Public Health 101 Series Public Health 101 Series Introduction to Public Health Informatics Instructor name Title Organization Note: This slide set is in the public domain and may be customized as needed by the user for informational

More information

Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse

Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse Shelley A. Rusincovitch, Sohayla Pruitt, MS, Rebecca Gray, DPhil, Kevin Li, PhD, Monique

More information

Statistics in Applications III. Distribution Theory and Inference

Statistics in Applications III. Distribution Theory and Inference 2.2 Master of Science Degrees The Department of Statistics at FSU offers three different options for an MS degree. 1. The applied statistics degree is for a student preparing for a career as an applied

More information

Data Privacy and Biomedicine Syllabus - Page 1 of 6

Data Privacy and Biomedicine Syllabus - Page 1 of 6 Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. (b.malin@vanderbilt.edu) Semester: Spring 2015 Time: Mondays

More information

HIPAA Training 2010. For Research Investigators and Study Staff

HIPAA Training 2010. For Research Investigators and Study Staff HIPAA Training 2010 For Research Investigators and Study Staff HIPAA IS... THE HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 Portability Created to ensure access to health coverage Allows for

More information

Privacy Preserved Association Rule Mining For Attack Detection and Prevention

Privacy Preserved Association Rule Mining For Attack Detection and Prevention Privacy Preserved Association Rule Mining For Attack Detection and Prevention V.Ragunath 1, C.R.Dhivya 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode,

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

Towards Privacy aware Big Data analytics

Towards Privacy aware Big Data analytics Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy

More information

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois Six Challenges for the Privacy and Security of Health Information Carl A. Gunter University of Illinois The Six Challenges 1. Access controls and audit 2. Encryption and trusted base 3. Automated policy

More information

Health Informatics. Dr. Gopalrao Jogdand, M.D. Ph.D. Professor & Head, Department of community medicine

Health Informatics. Dr. Gopalrao Jogdand, M.D. Ph.D. Professor & Head, Department of community medicine Health Informatics Dr. Gopalrao Jogdand, M.D. Ph.D. Professor & Head, Department of community medicine Goals for this presentation Explore the state of development in health informatics and health care

More information

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq.

The HITECH Act: Implications to HIPAA Covered Entities and Business Associates. Linn F. Freedman, Esq. The HITECH Act: Implications to HIPAA Covered Entities and Business Associates Linn F. Freedman, Esq. Introduction and Overview On February 17, 2009, President Obama signed P.L. 111-05, the American Recovery

More information

Deborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS

Deborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS Health Information Technology and Privilege Management A Policy Agenda for Progress Deborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS All material

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

MS Health Informatics (2014 2015)

MS Health Informatics (2014 2015) MS Health Informatics (2014 2015) Program Information Point of Contact Girmay Berhie (berhie@marshall.edu) Support for University and College Missions Marshall University is a multi campus public university

More information

Iowa Student Loan Online Privacy Statement

Iowa Student Loan Online Privacy Statement Iowa Student Loan Online Privacy Statement Revision date: Jan.6, 2014 Iowa Student Loan Liquidity Corporation ("Iowa Student Loan") understands that you are concerned about the privacy and security of

More information

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric

More information

Overview of Information Security. Murat Kantarcioglu

Overview of Information Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Information Security Murat Kantarcioglu Pag. 1 Purdue University Outline Information Security: basic concepts Privacy: basic

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation

More information

HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD

HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD DEFINITION OF BIG DATA Big data is a broad term for data sets so large or complex that traditional data processing applications

More information

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES FACULTY OF CONTEMPORARY SCIENCES AND TECHNOLOGIES STUDY PROGRAMME FOR POSTGRADUATE STUDIES (Master of Science) NAME OF THE PROGRAMME: BUSINESS INFORMATICS STUDIES 262 PROGRAMME DESCRIPTION Business Informatics

More information

State of Utah Version of Document E203 2013

State of Utah Version of Document E203 2013 State of Utah Version of Document E203 2013 Building Information Modeling and Digital Data Exhibit VBS Project Edition This version of AIA Document E203 2013 is modified by the State of Utah. Publication

More information

Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced

Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Establishment of a Bylaw 55 Unit in Applied Mathematics at UC Merced Several of the faculty of the School of Natural Sciences have planned the formation of a Bylaw 55 unit in Applied Mathematics. The case

More information

Bachelor Degree in Informatics Engineering Master courses

Bachelor Degree in Informatics Engineering Master courses Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Tertiary Use of Electronic Health Record Data. Maggie Lohnes, RN, CPHIMS, FHIMSS VP Provider Relations Anolinx, LLC October 26, 2015

Tertiary Use of Electronic Health Record Data. Maggie Lohnes, RN, CPHIMS, FHIMSS VP Provider Relations Anolinx, LLC October 26, 2015 Tertiary Use of Electronic Health Record Data Maggie Lohnes, RN, CPHIMS, FHIMSS VP Provider Relations Anolinx, LLC October 26, 2015 Disclosure of Conflicts of Interest No relevant conflicts of interest

More information

Director, Office of Health IT and e Health; State Government HIT Coordinator. Deputy Director, Office of Health IT and e Health

Director, Office of Health IT and e Health; State Government HIT Coordinator. Deputy Director, Office of Health IT and e Health Assignment Location: Minnesota Department of Health St. Paul, Minnesota Primary Mentor: Secondary Mentor: Martin LaVenture, PhD, MPH, FACMI Director, Office of Health IT and e Health; State Government

More information

How To Use Zato Health Interoperability Platform Software On A Patient Record

How To Use Zato Health Interoperability Platform Software On A Patient Record STATE OF CONNECTICUT State Innovation Model Health Information Technology (HIT) Council 2 nd Submission: Zato Follow up Questions 1) Is Zato able to provide a healthcare demonstration of their de-identified

More information

DATA MINING - 1DL105, 1DL025

DATA MINING - 1DL105, 1DL025 DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

A bright picture for biomedical informatics in the 21 st century

A bright picture for biomedical informatics in the 21 st century Biomedical Informatics: Improving Health, Healthcare, and Biomedical Research with Information Technology William Hersh, MD Professor and Chair Department of Medical Informatics & Clinical Epidemiology

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

Integrated Project Delivery Systems

Integrated Project Delivery Systems Building Construction Graduate Program Integrated Project Delivery Systems B u i l d i n g C o n s t r u c t i o n at G e o r g i a T e c h www.coa.gatech.edu/bc Welcome from the Director Thank you for

More information

A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC

A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC De-ID Data Corp, LLC Founded to: ENHANCE DATA ACCESS WHILE PROTECTING PATIENT PRIVACY Founders Problem

More information

Secure Sharing of Electronic Medical Records in Cloud Computing

Secure Sharing of Electronic Medical Records in Cloud Computing Secure Sharing of Electronic Medical Records in Cloud Computing MS Thesis Defense: Ruoyu Wu Graduate Supervisory Committee: Dr. Gail-Joon Ahn, Chair Dr. Sik-Sang Yau Dr. Dijiang Huang The Laboratory of

More information

A Secure Model for Medical Data Sharing

A Secure Model for Medical Data Sharing International Journal of Database Theory and Application 45 A Secure Model for Medical Data Sharing Wong Kok Seng 1,1,Myung Ho Kim 1, Rosli Besar 2, Fazly Salleh 2 1 Department of Computer, Soongsil University,

More information

OUTLINE FOR AN INTERDISCIPLINARY CERTIFICATE PROGRAM

OUTLINE FOR AN INTERDISCIPLINARY CERTIFICATE PROGRAM OUTLINE FOR AN INTERDISCIPLINARY CERTIFICATE PROGRAM I. Basic Information 1. Institution: University of Georgia Date: September 30, 2015 2. School/College: Franklin College of Arts and Sciences 3. Department/Division:

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Master of Science in Healthcare Informatics and Analytics Program Overview

Master of Science in Healthcare Informatics and Analytics Program Overview Master of Science in Healthcare Informatics and Analytics Program Overview The program is a 60 credit, 100 week course of study that is designed to graduate students who: Understand and can apply the appropriate

More information

RUTGERS POLICY. Responsible Office: RBHS Office of Ethics, Compliance & Corporate Integrity

RUTGERS POLICY. Responsible Office: RBHS Office of Ethics, Compliance & Corporate Integrity RUTGERS POLICY Section: 100.1.3 Section Title: HIPAA Policies Policy Name: Accounting Disclosures of Health Information Formerly Book: 00-01-15-20:00 Approval Authority: RBHS Chancellor Responsible Executive:

More information

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.

1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2. 1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes

More information

CALIFORNIA STATE UNIVERSITY, EAST BAY

CALIFORNIA STATE UNIVERSITY, EAST BAY CALIFORNIA STATE UNIVERSITY, EAST BAY First Quarter/Year of Offering Quarter: FALL Year: 2013 Date Submitted to APGS:12/6/12 Catalog: SELF SUPPORT (2014-15) REQUEST FOR APPROVAL OF NEW CERTIFICATE, OR

More information

How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008

How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption

More information

Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience

Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience Christopher Ryan, Ph.D., CIP IRB Director Professor of Psychiatry University of Pittsburgh ryancm@upmc.edu The

More information

DEGREE/PROGRAM CHANGE FORM C Form Number: C1817. Name of Initiator: Donald Godwin Email: dgodwin@unm.edu Phone Number: 505 272-0907 Date: 11-24-2015

DEGREE/PROGRAM CHANGE FORM C Form Number: C1817. Name of Initiator: Donald Godwin Email: dgodwin@unm.edu Phone Number: 505 272-0907 Date: 11-24-2015 DEGREE/PROGRAM CHANGE FORM C Form Number: C1817 Fields marked with * are required Name of Initiator: Donald Godwin Email: dgodwin@unm.edu Phone Number: 505 272-0907 Date: 11-24-2015 Associated Forms exist?

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

How To Help Your Health Care Provider With A Health Care Information Technology Bill

How To Help Your Health Care Provider With A Health Care Information Technology Bill 875 Greentree Road Pittsburgh, PA 15220 QuestDiagnostics.com Quest Diagnostics Statement on the Pennsylvania Health Information Technology Act (Senate Bill 8) to the Senate Communications & Technology

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information