Privacy Issues of Provenance in Electronic Healthcare Record Systems
|
|
|
- Egbert Carter
- 10 years ago
- Views:
Transcription
1 Tamás Kifor, László Z. Varga, Sergio Álvarez, Javier Vázquez-Salceda, Steven Willmott in Electronic 1
2 Introduction (1) l advantages of agent based techniques in healthcare information systems: coordination, personalization, dynamic, decentralized, etc. l but: indivisible healthcare history and therapy of the patient is allocated to independent and autonomous healthcare institutions l reunification of the different pieces of the therapy of a single patient executed at different places is based on ad-hoc methods and the information provided by the patient 2
3 Introduction (2) l provenance of electronic data in service oriented architectures: enable users to trace how a particular result has been produced by identifying the individual and aggregated services that produced a particular output l organ transplant application of the project: we propose the usage of provenance techniques to provide better healthcare services for patients by providing a unified view of the whole health treatment history 3
4 Introduction (3) l As long as the treatment and the data are distributed among the agents of the healthcare information system, privacy protection is focused on the protection of partial information pieces l with the introduction of provenance into the system we re-integrate the different pieces l our goals: l investigate the privacy aspects of introducing provenance into healthcare information systems l propose methods against the new types of risks 4
5 Distributed and Heterogeneous EHCR Applications (1) l fragmented and heterogeneous data resources and services forming islands of information l the corresponding workflow chunks are distributed among these islands of information l the treatment of the patient might require viewing these pieces of workflow and data as a whole 5
6 Distributed and Heterogeneous EHCR Applications (2) l ENV pre-standard developed by CEN/TC251 (European Committee of Normalisation, Technical Committee 251) is vital for the exchange of clinical data l EHCR architecture defines how to exchange data, but the linking of the workflow pieces which generated the data is not discussed in EHCR standards l provenance architecture helps to document the way the data was created and link the workflow pieces together 6
7 Electronic s and Case Antecedents l In order to pull together the medical history of a patient we have essentially three options: l Build a system mirroring the current one based on fragments of records in different places which can be pulled together to produce a unified view on demand (depending on the permissions of the viewer). l Build a system of a more centralised nature with a master record which can be read and written to by authorised healthcare providers (in a controlled fashion) and possible cached at a particular healthcare provider. l Build a hybrid system which stores fragments of data with providers but records high level events in a central master record. 7
8 in Service Oriented Architectures l provenance: the provenance of a piece of data is the process that led to the data l provenance of a piece of data will be represented in a computer system by some suitable documentation (a a set of p-assertions) l provenance lifecycle: l actors create p-assertionsp l p-assertions are stored in a provenance store l users or applications can query the provenance store l the provenance store and its contents can be managed 8
9 Organ Transplant Management Application 9
10 Issues l disclosures are necessary to treat patients, process claims, measure outcomes, and fight disease l privacy protection should not be focused on nondisclosure, but on controlled and irreversible disclosure l which mainly means the protection of the identity of the patient 10
11 in Management l technical measures that must be taken l separation must ensure that no unauthorized person can connect the identity of the patient with his medical or genetic data l data must be protected against any kind of unauthorized processing l unauthorized inputs, queries, modifications or deletions of the data while they are stored in the computer memory of the information system, as well as while the data are sent through the network from a computer to another, must be avoided l no unauthorized access l protect the data against accidental destruction and loss l access and data input logging 11
12 and (1) l we e introduce an additional agent type into the system: the provenance agent l healthcare agents give up part of the control over the data, the autonomy of the healthcare information is shared with the provenance store l provenance store is then able to link data and the workflow pieces that generated the data l the provenance system helps the integration of the information islands which raises additional privacy risks 12
13 and (2) l for provenance we need as much information as possible about the whole process to be able to trace back all that has happened l for privacy we need to restrict as much as possible the information available in order to avoid identification of patients and practitioners by unauthorised users l we identified two main risks: l cross-link risk: : the risk that unauthorised users are able to link some piece of medical data with an identifiable person by cross-linking information from different sources l event trail risk: : the risk to be able to identify a person by connecting the events and actions related to that person 13
14 Protecting in the OTM Application l event trail risk: information not available in the healthcare information system has to be matched with the information in the healthcare information system => requires more effort and information to exploit l cross-link risk: can be exploited using information available only in the healthcare information system => we focus on this l techniques to reduce the cross-link risk: l we do not put medical data in the provenance store l we anonymise the patient data 14
15 Medical Data and the Store (1) l Can we put medical data into p-assertions p which will be stored within provenance stores? l Can we put person identifiers into p-assertions? p l Is it enough if we anonymise patients in p-p assertions? l How can we safely anonymise the patient? l If we do not store medical information in the provenance store, then how can we retrieve the provenance of medical data? 15
16 Medical Data and the Store (2) l we dod not store sensitive medical data in the provenance store, but only references to such data l public identifiers of patients are not stored in the provenance store, only anonymised identifiers are used l the provenance store contains only the linkage and the skeleton of the provenance of the medical data, and the healthcare data can be laid on the skeleton by retrieving it from the healthcare information system when needed l retrieval is done by an EHCR system which is completely under the control of EHCR access rules 16
17 Anonym Identity in the Store (1) l the fact that the patient was treated or the place of treatment,, can be sensitive information => at least the patient identity has to be anonymised l anonymisation process requirements: l if f two sets of p-assertions p are related to the same patient, then there should be a way to link anonymised patient identifiers referring to the same patient in the different sets of p-assertionsp l anonymisation procedure should be irreversible l as s a consequence, no component in the system should store the real identifier of the patient and its anonymised identifier together 17
18 Anonym Identity in the Store (2) l in the OTM application the EHCRS system applies anonymous case identifiers l to connect different cases: l we store case identifiers in the p-assertions p and define relationships between them (the physician says that the current case is related to a previous one), or l we use a global anonymous tracer of the patient and connect each case identifier to that anonymous tracer in p-p assertions (helps to connect cases which are not explicitly known) 18
19 Conclusion l provenance may increase the quality of medical services by providing a unified view of the medical history of patients l but raises new privacy issues which we investigated l we e identified two new privacy risks l we e reasoned that the most critical of these risks is the cross-link risk and proposed methods to eliminate this risk l we are working on the implementation of the OTM application with provenance extension and we are implementing the outlined privacy protection methods l privacy issues investigated and methods proposed may be relevant beyond the specific implementation discussed here 19
20 Acknowledgements l IST project l IBM United Kingdom Limited, l University of Southampton, l University of Wales, Cardiff, l Deutsches Zentrum fur Luft- und Raumfahrt s.v, l Universitat Politècnica de Catalunya, l MTA SZTAKI l Javier Vázquez-Salceda s work has been also partially funded by the Ramón n y Cajal program of the Spanish Ministry of Education and Science 20
Privacy Issues of Provenance in Electronic Healthcare Record Systems
Privacy Issues of Provenance in Electronic Healthcare Record Systems Tamás Kifor 1, László Z. Varga 1 Sergio Álvarez 2, Javier Vázquez-Salceda 2, Steven Willmott 2 1 Computer and Automation Research Institute,
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY
UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY 1. Purpose 1.1 The Data Protection Act 1998 ( the Act ) has two principal purposes: i) to regulate the use by those (known as data controllers) who obtain,
Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606
Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606 J.A. Maldonado, M. Robles, P. Crespo Bioengineering, Electronics and Telemedicine
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George
Patterns of Information Management
PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy
Information Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
DARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Use Cases for Argonaut Project. Version 1.1
Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
Cloud Computing and Privacy Laws! 17.7. 22.7. 2011 Prof. Dr. Thomas Fetzer, LL.M. Technische Universität Dresden Law School
DEUTSCH-FRANZÖSISCHE SOMMERUNIVERSITÄT! FÜR NACHWUCHSWISSENSCHAFTLER 2011! CLOUD COMPUTING : HERAUSFORDERUNGEN UND MÖGLICHKEITEN UNIVERSITÉ DʼÉTÉ FRANCO-ALLEMANDE POUR JEUNES CHERCHEURS 2011! CLOUD COMPUTING
A Secure Autonomous Document Architecture for Enterprise Digital Right Management
A Secure Autonomous Document Architecture for Enterprise Digital Right Management Manuel Munier LIUPPA Université de Pau et des Pays de l Adour Mont de Marsan, France [email protected] SITIS 2011
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER Pharma companies are improving personalized relationships across more channels while cutting cost, complexity, and risk Increased competition
EDG Project: Database Management Services
EDG Project: Database Management Services Leanne Guy for the EDG Data Management Work Package EDG::WP2 [email protected] http://cern.ch/leanne 17 April 2002 DAI Workshop Presentation 1 Information in
UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July
Bodywhys Privacy Policy
Bodywhys Privacy Policy Website Bodywhys respects the privacy of all visitors to our website. This website privacy statement outlines our policy concerning the use and collection of personal information
Reporting trends and pain points of current and new customers. 2013 IBM Corporation
Reporting trends and pain points of current and new customers 2013 IBM Corporation Three main area of problems 1. Slow reporting performance But it is about the data source, not about reporting tool 2.
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY
UNILEVER PRIVACY PRINCIPLES Unilever takes privacy seriously. The following five principles underpin our approach to respecting your privacy: 1. We value the trust that you place in us by giving us your
Electronic Health Record (EHR) Standards Survey
Electronic Health Record (EHR) Standards Survey Compiled by: Simona Cohen, Amnon Shabo Date: August 1st, 2001 This report is a short survey about the main emerging standards that relate to EHR - Electronic
INTEGRATING RECORDS MANAGEMENT
INTERNATIONAL RECORDS MANAGEMENT TRUST INTEGRATING RECORDS MANAGEMENT IN ICT SYSTEMS Good Practice Indicators CONTENTS Figure 1: Designing a Records Management Improvement Programme iv Figure 2: Integrating
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
Gaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft
Advanced Document Management in an integrated environment
ST Synergy Suite 2, 17 Foley Street Balcatta WA 6021 Australia E-mail: [email protected] Web: www.stsynergy.com ST SYNERGY DOCUMENT CONTROL CENTRE.......... TECHNICAL WHITE PAPER Advanced Document Management
Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper
Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Using Provenance to Improve Workflow Design
Using Provenance to Improve Workflow Design Frederico T. de Oliveira, Leonardo Murta, Claudia Werner, Marta Mattoso COPPE/ Computer Science Department Federal University of Rio de Janeiro (UFRJ) {ftoliveira,
Information Management
G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,
Self-Protecting Documents for Cloud Storage Security
Self-Protecting Documents for Cloud Storage Security Manuel Munier 1 Vincent Lalanne 1 Magali Ricarde 2 1 LIUPPA 2 BackPlan Univ Pau & Pays Adour Project Communication Control Mont de Marsan, France Pau,
Copyright 2005-2010 Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement
DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004
DISASTER RECOVERY INSTITUTE CANADA (DRIC) UPDATED APRIL 2004 This website privacy policy is intended to provide DRIC website visitors with information about how DRIC treats private and personal information
Privacy and Transparency for Decision Making. Simone Fischer-Hübner Karlstad University, Sweden MDAI 2015
Privacy and Transparency for Decision Making Simone Fischer-Hübner Karlstad University, Sweden MDAI 2015 Content I. Profiling, Big Data & Decision Making - Privacy Challenges II. III. IV. Peer Profiling
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
IT Privacy Certification
IT Privacy Certification Program Introduction copyright 2011, IAPP Overview The Certified Information Privacy Professional/Information Technology (CIPP/IT) is the newest credentialing initiative from the
Master Data Management
Master Data Management Managing Data as an Asset By Bandish Gupta Consultant CIBER Global Enterprise Integration Practice Abstract: Organizations used to depend on business practices to differentiate them
Records Management Policy
Records Management Policy Document Number SOP2006-073 File No. 07/7 Date issued 1 September 2006 Author Branch Records and Mail Services Unit Branch contact 9320.7722 Division Finance & Data Services Summary
The purpose of this document is to provide a framework for ConnectGroups in dealing with privacy considerations.
PRIVACY POLICY Preliminary Note Before any policy is adopted in this area, there should be wide consultation with all potentially affected parties. Correspondingly, this draft policy should not be adopted,
AHIMA Curriculum Map Health Information Management Associate Degree Approved by AHIMA Education Strategy Committee February 2011
HIM Associate Degree Entry Level Competencies (Student Learning Outcomes) I. Domain: Health Data Management A. Subdomain: Health Data Structure, Content and Standards 1. Collect and maintain health data
ACCESS TO MEDICAL RECORDS. By Felicia Jolaoye Blavo & Co Solicitors Ltd.
ACCESS TO MEDICAL RECORDS. Dorset Healthcare NHS Foundation Trust v MH (2009) : A full disclosure of all relevant material should generally be given and should not present a problem in the vast majority
Mona Osman MD, MPH, MBA
Mona Osman MD, MPH, MBA Objectives To define an Electronic Medical Record (EMR) To demonstrate the benefits of EMR To introduce the Lebanese Society of Family Medicine- EMR Reality Check The healthcare
Hansken job scheduler: Definition of business rules according to the MBRM framework. July 6th, 2012. R. van Baar (NFI)
Hansken job scheduler: Definition of business rules according to the MBRM framework Date: Supervisor: July 6th, 2012 Dr. M. Worring (UvA) R. van Baar (NFI) Table of contents Introduction o Digital investigation
APPLICATION COMPLIANCE AUDIT & ENFORCEMENT
TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
Collection and Use of Information
AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we
4.04: Preparing for Preparing for a JCAHO Survey of a Hospital's HIPAA Privacy and Security Compliance Program
4.04: Preparing for Preparing for a JCAHO Survey of a Hospital's HIPAA Privacy and Security Compliance Program Leslie C. Bender, Esq. General Counsel & Privacy Officer roiwebed Company Principal, Leslie
IBM DB2 CommonStore for Lotus Domino, Version 8.3
Delivering information on demand IBM DB2 CommonStore for Lotus Domino, Version 8.3 Highlights Controls long-term growth Delivers records management and performance of your integration, supporting corporate
Effective Contract Management
Effective Contract Management How can we do the right things at the right time if we do not know the contents of our contracts? ProcessWorld 2011 Berlin, June 1st 2011 Michael Neumann Agenda Background
IBM Software. IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records
IBM Software IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian
Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health
Integrated Healthcare Information System Darko Gvozdanović, M.Sc.E.E. Department manager e-health Agenda Healthcare challenges Ericsson addressing the challenges Integrated Healthcare Information System
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Digital Assets Repository 3.0. PASIG User Group Conference Noha Adly Bibliotheca Alexandrina
Digital Assets Repository 3.0 PASIG User Group Conference Noha Adly Bibliotheca Alexandrina DAR 3.0 DAR manages the full lifecycle of a digital asset: its creation, ingestion, metadata management, storage,
Requirements of Secure Storage Systems for Healthcare Records
Requirements of Secure Storage Systems for Healthcare Records Ragib Hasan 1, Marianne Winslett 1, and Radu Sion 2 1 University of Illinois at Urbana-Champaign Urbana, IL 61801, USA (rhasan, winslett)@cs.uiuc.edu
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
7i Imaging on Demand PACS Solution FAQ s
7i Imaging on Demand PACS Solution FAQ s Standards: 1. Do you use any proprietary software to manage the images? No, our image management software manages the images and is fully DICOM compliant with no
Approaches for Cloud and Mobile Computing
Joint CLEEN and ACROSS Workshop on Cloud Technology and Energy Efficiency in Mobile Communications at EUCNC 15, Paris, France - 29 June, 2015 Interoperable Data Management Approaches for Cloud and Mobile
Protect, Share, and Distribute Healthcare Data with ehealth Managed Services
Protect, Share, and Distribute Healthcare Data with ehealth Managed Services An innovative offering CARESTREAM ehealth Managed Services include hardware, software, maintenance, remote monitoring, updates
Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
Applying Information Lifecycle Management Strategies Enables Healthcare Providers to Accelerate Clinical Workflow
An EMC Healthcare Perspective Applying Information Lifecycle Management Strategies Enables Healthcare Providers to Accelerate Clinical Workflow By Roberta A. Katz Healthcare Information Technology Challenges........2
White Paper. Document Security and Compliance. April 2013. Enterprise Challenges and Opportunities. Comments or Questions?
White Paper April 2013 Document Security and Compliance Enterprise Challenges and Opportunities Comments or Questions? Table of Contents Introduction... 3 Prevalence of Document-Related Security Breaches...
HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD
HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD DEFINITION OF BIG DATA Big data is a broad term for data sets so large or complex that traditional data processing applications
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Cloud Computing ISO Security and Privacy Standards: 27017, 27018, 27001 Mike Edwards (Chair UK Cloud Standards Committee)
Cloud Computing ISO Security and Privacy Standards: 27017, 27018, 27001 Mike Edwards (Chair UK Cloud Standards Committee) Mike Edwards Senior Technical Staff Member, IBM Cloud Computing & SOA Standards,
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Manual 074 Electronic Records and Electronic Signatures 1. Purpose
1. Purpose The purpose of this document is to provide an interpretation of FDA 21 CFR Part 11, Electronic Records; Electronic Signatures (ER/ES) and to provide guidance for acceptable practices in the
Data Grids. Lidan Wang April 5, 2007
Data Grids Lidan Wang April 5, 2007 Outline Data-intensive applications Challenges in data access, integration and management in Grid setting Grid services for these data-intensive application Architectural
Knowledge Management and Collaboration Analysis of the Siemens Healthcare Consulting Group
Knowledge Management and Collaboration Analysis of the Siemens Healthcare Consulting Group EVA GATTNAR, JENS SCHNEIDER, BRIGITTE STROETMANN AND OKAN EKINCI Siemens AG Healthcare Sector Allee am Röthelheimpark
Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.
Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting
