Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse April Oslo
|
|
|
- Alice Ray
- 9 years ago
- Views:
Transcription
1 Privacy Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse April Oslo Kassaye Yitbarek Yigzaw UiT The Arctic University of Norway Outline Background Introduction utility De-identification Secure multi-party computation 2 1
2 Background Electronic health data are being widely collected Administrative data, e.g. census, survey, socioeconomic, and registry Invaluable resource to improve healthcare systems effectiveness, efficiencies and quality of care Enormous benefits for individuals and society in general Jutte DP et al. Administrative Record Linkage as a Tool for Public Health Research. Annual Review of Public Health 2011 Geissbuhler A et al. Trustworthy of health data: A transnational perspective. International Journal of Medical Informatics opportunities Why are healthcare costs increasing? What are the comparative benefits and risks of prescription drugs? What is the evidence base for procedures? What explains variation in health care spending and use? How do environmental factors affect disease patterns? How can the health of minorities and special needs groups be improved? What does this mean for patients like me? Slide borrowed from Michael G. Kahn. Learning Health Systems From Concept to National Deployment. IEEE BHI2014 Conference 4 2
3 Introduction Individuals privacy concerns are the main challenge Healthcare institutions are also concerned about their own privacy 1 Most ethical and legal regulations allow data through: Informed consent Consent waiver by ethics committee (e.g. REK) (under certain conditions) de-identification Secure multi-party computation (SMC) 1 El Emam K, et al. Physician privacy concerns when disclosing patient data for public health purposes during a pandemic influenza outbreak. BMC Public Health 2011;11: Increase privacy protection and data utility Privacy Research 6 3
4 utility utility is the value of a given data for research The data being available for research Analytical completeness is possible required analyses that can be done on the data Analytical validity is accuracy and generalizability of analyses results 7 Informed consent Everybody Systematic bias Consented subjects Potential subjects Decreased generalizability of analyses results to the general population Bohensky MA et al. Linkage: A powerful research tool with potential problems. BMC Health Services Research
5 Informed consent cont Consent requires infeasible time and money for large public health studies Consent alone protects autonomy, but does not guarantees that released data will remain private 1 1 Taylor P. Personal genomes: when consent gets in the way. Nature De-identification de-identification methods remove or modify identifiers The aim is to prevent identity disclosure Often, there is probability of assigning correct identity (re-identification) to records The more quasi-identifiers are removed or modified Less probability of re-identification Less analytical completeness or validity 10 5
6 Probability of re-identification Growth of public data utility Probability of re-identification Acceptable probability of re-identification control on data recipient 4/27/2015 De-identification cont HIPAA safe harbor removes 18 identifiers Limited dataset removes 16 of the 18 identifiers, except dates and some geographical data Safe harbor has less analytical completeness, e.g. association between treatments and health outcomes 1 Limited dataset has more probability of reidentification 2 1 Nass SJ et al. Beyond the HIPAA Privacy Rule: Enhancing privacy, improving health through research. National Academies Press; Benitez K et al. Evaluating re-identification risks with respect to the HIPAA privacy rule. JAMIA De-identification cont Non-public µ µ µ Public Ohm P. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. Rochester, NY: Social Science Research Network; 2009 Emam KE at al. Anonymising and sharing individual patient data. BMJ Benitez K et al. Evaluating re-identification risks with respect to the HIPAA privacy rule. JAMIA
7 De-identified data sharing Hospital Lab Third Party Centralized storage Distributed storage GP 13 Secure multi-party computation (SMC) Hospital Lab Secure multi-party computation emulate the third party GP Lindell Y, et al. Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality
8 Secure multi-party computation (SMC) SMC ensures that no more private information is revealed beyond the computation output Each data custodian has the capability of determining what/who compute on their data 15 Secure summation protocol Individual value remain private The summation of an institution s values is also private r 2 = r 1 + x 2 Id x x 2 = {r 2 } n 2 {r 1 } r 3 = r 2 + x 3 n 3 n 1 r 1 = r 0 + x 1 Id x Id x x 3 = {r 3 } {r 0 } n c x 1 = r 0 = rand() SUM = (r 3 r 0 ) Andersen A, Yigzaw KY, Karlsen R. Privacy preserving health data processing. IEEE Healthcom,
9 Example applications SMC protocol for disease surveillance 1 SMC protocol for logistic regression tested for detection of adverse drug events 2 1 El Emam K et al. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance JAMIA El Emam K et al. A secure distributed logistic regression protocol for the detection of rare adverse drug events. JAMIA History The SMC concept is pioneered by Yao (1982) Most SMC protocols were designed to show feasibility During the last decade better SMC protocols and implementations started to appear SMC protocols vary with privacy guaranty, efficiency and scalability Strong privacy is often achieved using more complex techniques, which are less efficient and scalable Bogdanov D. Sharemind: programmable secure computations with practical applications. PhD Thesis. Tartu University,
10 Discussion SMC techniques do not modify or remove data attributes and do not have selection bias, therefore data utility is not affected More efficient and scalable techniques are being developed Protects the privacy of both individuals and health institutions Enable health institutions to maintain strong control over their private data These could encourage more individuals and institutions to allow data 19 Acknowledgement PhD supervisors (Johan Gustav Bellika, Anders Andersen, and Gunnar Hartvigsen) Meskerem Asfaw Hailemichael Tromsø Telemedicine Laboratory (TTL) UiT The Arctic University of Norway Norwegian Center for Telemedicine and Integrate Care (NST) 20 10
11 Kassaye Yitbarek Yigzaw PhD candidate UiT The Arctic University of Norway
The De-identification of Personally Identifiable Information
The De-identification of Personally Identifiable Information Khaled El Emam (PhD) www.privacyanalytics.ca 855.686.4781 [email protected] 251 Laurier Avenue W, Suite 200 Ottawa, ON Canada K1P 5J6
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF
The Use of Patient Records (EHR) for Research
The Use of Patient Records (EHR) for Research Mary Devereaux, Ph.D. Director, Biomedical Ethics Seminars Assistant Director, Research Ethics Program & San Diego Research Ethics Consortium Abstract The
Degrees of De-identification of Clinical Research Data
Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal
De-Identification 101
De-Identification 101 We live in a world today where our personal information is continuously being captured in a multitude of electronic databases. Details about our health, financial status and buying
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research
Policy Brief: Protecting Privacy in Cloud-Based Genomic Research Version 1.0 July 21 st, 2015 Suggested Citation: Adrian Thorogood, Howard Simkevitz, Mark Phillips, Edward S Dove & Yann Joly, Policy Brief:
HIPAA-Compliant Research Access to PHI
HIPAA-Compliant Research Access to PHI HIPAA permits the access, disclosure and use of PHI from a HIPAA Covered Entity s or HIPAA Covered Unit s treatment, payment or health care operations records for
Data Privacy and Biomedicine Syllabus - Page 1 of 6
Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. ([email protected]) Semester: Spring 2015 Time: Mondays
Secondary Use of Healthcare Data for Public Health. Leslie Lenert, MD, MS FACMI Director, National Center for Public Health Informatics
Secondary Use of Healthcare Data for Public Health Leslie Lenert, MD, MS FACMI Director, National Center for Public Health Informatics NCPHI Overview Agenda Three disparate secondary uses of clinical data
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Accelerating Clinical Trials Through Shared Access to Patient Records
INTERSYSTEMS WHITE PAPER Accelerating Clinical Trials Through Shared Access to Patient Records Improved Access to Clinical Data Across Hospitals and Systems Helps Pharmaceutical Companies Reduce Delays
Yale University Open Data Access (YODA) Project Procedures to Guide External Investigator Access to Clinical Trial Data Last Updated August 2015
OVERVIEW Yale University Open Data Access (YODA) Project These procedures support the YODA Project Data Release Policy and more fully describe the process by which clinical trial data held by a third party,
Health Data Governance: Privacy, Monitoring and Research - Policy Brief
Health Data Governance: Privacy, Monitoring and Research - Policy Brief October 2015 www.oecd.org/health Highlights All countries can improve their health information systems and make better use of data
Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule
AA Privacy RuleP DEPARTMENT OF HE ALTH & HUMAN SERVICES USA Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule NIH Publication Number 03-5388 The HI Protecting Personal
What is Covered by HIPAA at VCU?
What is Covered by HIPAA at VCU? The Privacy Rule was designed to protect private health information from incidental disclosures. The regulations specifically apply to health care providers, health plans,
Winthrop-University Hospital
Winthrop-University Hospital Use of Patient Information in the Conduct of Research Activities In accordance with 45 CFR 164.512(i), 164.512(a-c) and in connection with the implementation of the HIPAA Compliance
Legal Insight. Big Data Analytics Under HIPAA. Kevin Coy and Neil W. Hoffman, Ph.D. Applicability of HIPAA
Big Data Analytics Under HIPAA Kevin Coy and Neil W. Hoffman, Ph.D. Privacy laws and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule can have a significant
The De-identification Maturity Model Authors: Khaled El Emam, PhD Waël Hassan, PhD
A PRIVACY ANALYTICS WHITEPAPER The De-identification Maturity Model Authors: Khaled El Emam, PhD Waël Hassan, PhD De-identification Maturity Assessment Privacy Analytics has developed the De-identification
ENSURING ANONYMITY WHEN SHARING DATA. Dr. Khaled El Emam Electronic Health Information Laboratory & uottawa
ENSURING ANONYMITY WHEN SHARING DATA Dr. Khaled El Emam Electronic Health Information Laboratory & uottawa ANONYMIZATION Motivations for Anonymization Obtaining patient consent/authorization not practical
Healthcare data analytics. Da-Wei Wang Institute of Information Science [email protected]
Healthcare data analytics Da-Wei Wang Institute of Information Science [email protected] Outline Data Science Enabling technologies Grand goals Issues Google flu trend Privacy Conclusion Analytics
Principles for Responsible Clinical Trial Data Sharing
Principles for Responsible Clinical Trial Data Sharing Our Commitment to Patients and Researchers Biopharmaceutical companies are committed to enhancing public health through responsible sharing of clinical
Understanding De-identification, Limited Data Sets, Encryption and Data Masking under HIPAA/HITECH: Implementing Solutions and Tackling Challenges
Understanding De-identification, Limited Data Sets, Encryption and Data Masking under HIPAA/HITECH: Implementing Solutions and Tackling Challenges Daniel C. Barth-Jones, M.P.H., Ph.D. Assistant Professor
Guidance on De-identification of Protected Health Information November 26, 2012.
Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule November 26, 2012 OCR gratefully
Clinical Study Reports Approach to Protection of Personal Data
Clinical Study Reports Approach to Protection of Personal Data Background TransCelerate BioPharma Inc. is a non-profit organization of biopharmaceutical companies focused on advancing innovation in research
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0 Guidance Document Prepared by: PCORnet Data Privacy Task Force Submitted to the PMO Approved by the PMO Submitted
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " "
De-Identification of Health Data under HIPAA: Regulations and Recent Guidance" " " D even McGraw " Director, Health Privacy Project January 15, 201311 HIPAA Scope Does not cover all health data Applies
HIPAA Compliance Strategies for Pharmaceutical Manufacturers,
HIPAA Compliance Strategies for Pharmaceutical Manufacturers, PBMs and Pharmacies Jean-Paul Hepp,, Ph.D. Director, Global Privacy HIPAA Colloquium Harvard MA; August 22, 2002 1 Agenda Privacy ~ Definitions
IRB Application for Medical Records Review Request
Office of Regulatory Research Compliance Institutional Review Board FORM B1 : Medial Records Review Application FORM B1 IRB Application for Medical Records Review Request Principal Investigator: Email:
De-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008 1 1 Slide 1 cmw1 Craig M. Winter, 4/25/2008 Background
Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics
Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics Privacy Analytics - Overview For organizations that want to safeguard and enable their
Privacy-by-Design: Understanding Data Access Models for Secondary Data
Privacy-by-Design: Understanding Data Access Models for Secondary Data Journal: 2013 AMIA Clinical Research Informatics Summit Manuscript ID: AMIA-013-C2013.R1 Manuscript Type: Paper Date Submitted by
Clinical Research from EHR data
Clinical Research from EHR data Gunnar O Klein professor in Health Informatics at NSEP Norwegian Centre for EHR Research Workshop at HelseIT in Trondheim 2012-09-19 1 Purpose of the workshop Together with
1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.
1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes
Comments of the World Privacy Forum To: Office of Science and Technology Policy Re: Big Data Request for Information. Via email to bigdata@ostp.
3108 Fifth Avenue Suite B San Diego, CA 92103 Comments of the World Privacy Forum To: Office of Science and Technology Policy Re: Big Data Request for Information Via email to [email protected] Big Data
How To Use An Electronic Health Record
STRENGTHENING HEALTH INFORMATION INFRASTRUCTURE FOR QUALITY MEASUREMENT 5 th Conference on Quality Assurance in Health Care of the Federal Joint Committee, Berlin 14 October 2013 [email protected]
De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013
De-identification Koans ICTR Data Managers Darren Lacey January 15, 2013 Disclaimer There are several efforts addressing this issue in whole or part Over the next year or so, I believe that the conversation
Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience
Implementing Honest Broker System(s) in Academic Medical Centers: The Pittsburgh Experience Christopher Ryan, Ph.D., CIP IRB Director Professor of Psychiatry University of Pittsburgh [email protected] The
Privacy and Security within an Interoperable EHR
1 Privacy and Security within an Interoperable EHR Stan Ratajczak Director Privacy and Security Solutions Architecture Group November 30, 2005 Electronic Health Information and Privacy Conference Ottawa
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
Abstract. It s peace of mind knowing that we ve done everything that is possible to meet industry standards for de-identification. Dr.
Abstract In this presentation I will discuss the adoption of the Privacy Analytics Risk Assessment Tool (PARAT) by the Institute for Clinical Evaluative Sciences (ICES), for the Ontario Cancer Data Linkage
IRB Month Investigator Meeting April 2014
April 2014 AUDITS TRENDS EMR COMPLIANCE PRACTICES EMR FEDERAL REGULATIONS MONITORING REGULATORY SECURITY THREATS ACADEMI CINA BREACHES REVIEW COMPUTING MOBILE CLOUD HIPAA CENTER OPERATION S RESEARCH C
Privacy Techniques for Big Data
Privacy Techniques for Big Data The Pros and Cons of Syntatic and Differential Privacy Approaches Dr#Roksana#Boreli# SMU,#Singapore,#May#2015# Introductions NICTA Australia s National Centre of Excellence
What is Covered under the Privacy Rule? Protected Health Information (PHI)
HIPAA & RESEARCH What is Covered under the Privacy Rule? Protected Health Information (PHI) Health information + Identifier = PHI Transmitted or maintained in any form (paper, electronic, forms, web-based,
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
Considering De-Identification? Legacy Data. Kymberly Lee 16-Jul-2015
Considering De-Identification? Legacy Data Kymberly Lee 16-Jul-2015 Introduction This presentation provides an overview of Clinical data sharing, clinical data privacy, and clinical transparency. Discuss
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets
HIPAA-P06 Use and Disclosure of De-identified Data and Limited Data Sets FULL POLICY CONTENTS Scope Policy Statement Reason for Policy Definitions ADDITIONAL DETAILS Web Address Forms Related Information
Testimony. before the. National Committee on Vital and Health Statistics Ad Hoc Workgroup for Secondary Uses of Health Data
Testimony before the National Committee on Vital and Health Statistics Ad Hoc Workgroup for Secondary Uses of Health Data Presented by: Shirley S. Lady Vice President, BHI Blue Cross and Blue Shield Association
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC
A Commercial Approach to De-Identification Dan Wasserstrom, Founder and Chairman De-ID Data Corp, LLC De-ID Data Corp, LLC Founded to: ENHANCE DATA ACCESS WHILE PROTECTING PATIENT PRIVACY Founders Problem
Table of Contents. Page 1
Table of Contents Executive Summary... 2 1 CPSA Interests and Roles in ehealth... 4 1.1 CPSA Endorsement of ehealth... 4 1.2 CPSA Vision for ehealth... 5 1.3 Dependencies... 5 2 ehealth Policies and Trends...
Global Alliance for Genomics & Health Data Sharing Lexicon
Global Alliance for Genomics & Health Data Sharing Lexicon Preamble The Global Alliance for Genomics and Health ( GA4GH ) is an international, non-profit coalition of individuals and organizations working
Dispelling the Myths Surrounding De-identification:
Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Khaled El Emam, Ph.D.
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers
Big Data, Not Big Brother: Best Practices for Data Analytics Peter Leonard Gilbert + Tobin Lawyers March 2013 How Target Knew a High School Girl Was Pregnant Before Her Parents Did just because you can,
20 years of Telemedicine in Tromsø, Norway
Lecture title: 20 years of Telemedicine in Tromsø, Norway Abstract: The lecture gives an overview of telemedicine in Tromsø and North Norway since the first telemedicine projects were started in 1987-1988.
How to De-identify Data. Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008
How to De-identify Data Xulei Shirley Liu Department of Biostatistics Vanderbilt University 03/07/2008 1 Outline The problem Brief history The solutions Examples with SAS and R code 2 Background The adoption
Data Driven Approaches to Prescription Medication Outcomes Analysis Using EMR
Data Driven Approaches to Prescription Medication Outcomes Analysis Using EMR Nathan Manwaring University of Utah Masters Project Presentation April 2012 Equation Consulting Who we are Equation Consulting
Secondary Uses of Data for Comparative Effectiveness Research
Secondary Uses of Data for Comparative Effectiveness Research Paul Wallace MD Director, Center for Comparative Effectiveness Research The Lewin Group [email protected] Disclosure/Perspectives Training:
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with
Privacy Impact Assessment: care.data
High quality care for all, now and for future generations Document Control Document Purpose Document Name Information Version 1.0 Publication Date 15/01/2014 Description Associated Documents Issued by
Privacy: Legal Aspects of Big Data and Information Security
Privacy: Legal Aspects of Big Data and Information Security Presentation at the 2 nd National Open Access Workshop 21-22 October, 2013 Izmir, Turkey John N. Gathegi University of South Florida, Tampa,
Standardization of the Australian Medical Data Exchange Model. Michael Legg PhD
Standardization of the Australian Medical Data Exchange Model Michael Legg PhD Agenda The National ehealth Program Pathology in Australia Standardisation in Australia Some projects Communication Any meaningful
DATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
HIPAA and Clinical Research
To Heal. To Teach. To Discover. HIPAA and Clinical Research 2011 Training Jennifer Edlind, UH Privacy Officer Ryan Terry, UH Information Security Officer 1 Agenda Research credentialing overview HIPAA
The Health Information Act. Use and Disclosure of Health Information for Research
The Health Information Act Use and Disclosure of Health Information for Research The Health Information Act (HIA) sets out rules respecting the use and disclosure of health information for research purposes
Data Analytics in Health Care
Data Analytics in Health Care ONUP 2016 April 4, 2016 Presented by: Dennis Giokas, CTO, Innovation Ecosystem Group A lot of data, but limited information 2 Data collection might be the single greatest
Health Data De-Identification by Dr. Khaled El Emam
RISK-BASED METHODOLOGY DEFENSIBLE COST-EFFECTIVE DE-IDENTIFICATION OPTIMAL STATISTICAL METHOD REPORTING RE-IDENTIFICATION BUSINESS ASSOCIATES COMPLIANCE HIPAA PHI REPORTING DATA SHARING REGULATORY UTILITY
