Data Privacy Protection of Medical Data in a National Context
|
|
|
- Willa Gilbert
- 10 years ago
- Views:
Transcription
1 Data Privacy Protection of in a National Context Dr. Uwe Roth Heiko Zimmermann, Dr. Stefan Benzschawel Friday, 20 April 2012 Version v1.0 r
2 in a National Context Data Privacy and Data Security Medical data must be protected against Unauthorized access Misuse Encryption of medical data ensures confidentiality Additional plaintext metadata is needed to query for documents, e.g. Document type Circumstances of creation Author
3 in a National Context Data Privacy and Data Security Fine-grained queries requires more metadata But: Further metadata opens the risk to disclose sensitive information De-Identification of metadata as a minimal demand Replacing of demographics by pseudonyms Data sets with the same pseudonym belong to the same person (no anonymisation) Demographics must not be calculated out of the pseudonym
4 Storage and Querying of Hospitals Laboratories Doctors Offices Data Source Data Consumer Metadata Query for National ehealth Platform Data Repository Encrypted Data Storage Data Registry Metadata List of Medical Documents Uwe Roth Data Privacy Protection of in a National Context 6
5 Demographic Data and Pseudonyms Demographic Data Pseudonym Hospitals Laboratories Doctors Offices Data Source Data Consumer Metadata Query for National ehealth Platform Data Repository Encrypted Data Storage Data Registry Metadata List of Medical Documents Uwe Roth Data Privacy Protection of in a National Context 7
6 De-Identification Trusted Third Party Demographic Data Trusted Third Party De-Identification Pseudonym Hospitals Laboratories Doctors Offices Data Source Data Consumer Metadata Query for National ehealth Platform Data Repository Encrypted Data Storage Data Registry Metadata List of Medical Documents Uwe Roth Data Privacy Protection of in a National Context 8
7 De-Identification Handshaking Protocol Demo graphic Data Pseudonym Pick-Up-Ticket Demographic Data Pick-Up Ticket Trusted Third Party De-Identification Pseudonym Pick-Up Ticket Hospitals Laboratories Doctors Offices Data Source Data Consumer Query for Pick-Up Ticket National ehealth Platform Data Repository Encrypted Data Storage Data Registry Metadata List of Medical Documents Uwe Roth Data Privacy Protection of in a National Context 9
8 Trusted Third Party Organizational and Legal Only place where demographics and their pseudonyms are known Organizational and legal independent from data sources data users data registry data repositories No pass-through of medical data No de-identification/modification of medical data (integrity of signed documents) Can be put in the Internet, while users of the service stay behind firewalls Uwe Roth Data Privacy Protection of in a National Context 11
9 Trusted Third Party Identification of Patients Identifies persons by given demographics Normalization step of demographics is needed Correction of typographic errors Phonetic reduction or names Align to official addresses Weighting of attributes with respect to entropy Distance calculation to existing identities If distance closer than a certain threshold: identity matches Uwe Roth Data Privacy Protection of in a National Context 12
10 Trusted Third Party Matching and Pseudonym Creation Matching decision: Definite positive match: Take existing pseudonym Definite no match: Create new pseudonym Unclear match: Create new pseudonym for the time being Requires manual intervention to take decision Creation of source-depending pseudonyms allows later correction of matching decisions Trusted Third Party will provide all pseudonyms of the same persons on request Uwe Roth Data Privacy Protection of in a National Context 13
11 Trusted Third Party Authentication and Access Control Allows de-identification requests only for data sources and data users Allows retrieval of pseudonym only for data registry and data repositories Guaranteed by Security Token service Security Token Service provides security tokens after authentication with role information Uwe Roth Data Privacy Protection of in a National Context 15
12 Secondary Use Statistics Demo graphic Data Trusted Third Party 1 st Level De-Identification Pseudonym National ehealth Platform 2 nd Level De-Identification Patient ID Hospitals Laboratories Doctors Offices Data Source Statistical Extract National ehealth Platform Statistical Database Query for Statistics Statistics or Statistical Extract Statistics Office Researcher Data Consumer Uwe Roth Data Privacy Protection of in a National Context 18
13 Conclusion Data sources and data users never get in touch with the pseudonym Data repositories and data storage never get in touch with demographics Enforced by the use of a security token service and role based access Identity vigilance to monitor matching decisions Correction of matching decision possible Trusted third party provides data privacy for unencrypted meta data and statistical extracts Uwe Roth Data Privacy Protection of in a National Context 20
14 Data Privacy Protection of in a National Context Dr. Uwe Roth ([email protected]) Heiko Zimmermann, Dr. Stefan Benzschawel Friday, 20 April 2012 Version v1.0 r
PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
1.2: DATA SHARING POLICY. PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance. 1.2.
1.2: DATA SHARING POLICY PART OF THE OBI GOVERNANCE POLICY Available at: http://www.braininstitute.ca/brain-code-governance 1.2.1 Introduction Consistent with its international counterparts, OBI recognizes
Call Center and Clearing System. ID Technologies Inc
Call Center and Clearing System ID Technologies Inc Features Enterprise level ticket generation, clearing and tracking system GIS based integrated graphical information. Multi-format map integration Real
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS]
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS] 1 Document information... 2 1.1 Date of Last Update... 2 1.2 Distribution List for Notifications... 2 1.3 Locations where this Document May Be Found... 2 1.4 Authenticating
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Strategy for Email Management in Canadian Jurisdictions
Strategy for Email Management in Canadian Jurisdictions Email is a fundamental part of doing business today, and the management of email has become a critical issue across all jurisdictions. All governments
Public Health and the Learning Health Care System Lessons from Two Distributed Networks for Public Health
Public Health and the Learning Health Care System Lessons from Two Distributed Networks for Public Health Jeffrey Brown, PhD Assistant Professor Department of Population Medicine Harvard Medical School
WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE
WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE INTRODUCTION The healthcare industry is driven by many specialized documents. Each day, volumes of critical information are sent to and from
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Index. Registry Report
2013.1-12 Registry Report 01 02 03 06 19 21 22 23 24 25 26 27 28 29 31 34 35 Index Registry Report 02 Registry Report Registry Report 03 04 Registry Report Registry Report 05 06 Registry Report Registry
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009
Joint Position on the Disclosure of Clinical Trial Information via Clinical Trial Registries and Databases 1 Updated November 10, 2009 The innovative pharmaceutical industry 2 is committed to the transparency
De-identification of Data using Pseudonyms (Pseudonymisation) Policy
De-identification of Data using Pseudonyms (Pseudonymisation) Policy Version: 2.0 Page 1 of 7 Partners in Care This is a controlled document. It should not be altered in any way without the express permission
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
OIOSAML Rich Client to Browser Scenario Version 1.0
> OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details
De-Identification of Clinical Data
De-Identification of Clinical Data Sepideh Khosravifar, CISSP Info Security Analyst IV TEPR Conference 2008 Ft. Lauderdale, Florida May 17-21, 2008 1 1 Slide 1 cmw1 Craig M. Winter, 4/25/2008 Background
Synapse Privacy Policy
Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing
Remote Access Procedure. e-governance
for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type of Information Document
Collection and Use of Information
AVO Privacy Policy AVOapp, Inc. treat with responsibility for the safety of your personal data. Please read the following to be informed about our Privacy Policy ("Policy"). This Policy details how we
Big Data and Big Data Governance
The First Step in Information Big Data and Big Data Governance Kelle O Neal [email protected] 15-25- 9661 @1stsanfrancisco www.firstsanfranciscopartners.com Table of Contents Big Data
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
APPMACHINE MOBILE PRIVACY STATEMENT. Version, May 29, 2015
APPMACHINE MOBILE PRIVACY STATEMENT Version, May 29, 2015 The privacy of all of our Users is very important to AppMachine and the AppMachine App-builders (hereto referred to as App-owner). When you, as
Building Regional and National Health Information Systems. Mike LaRocca
Building Regional and National Health Information Systems Mike LaRocca Agenda What are the key use cases driving New York? What is the SHIN-NY NY and its architecture? What standards and protocols were
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
Efficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
Data Sharing Protocol
Data Sharing Protocol Agreement for Sharing Data Between Partners of the South Dublin Childrens Services Committee Version 0.4 Final Draft June 2009 Contents 1 Preface...3 2 Introduction & Overview...3
Pseudonymization for Secondary Use of Cloud Based Electronic Health Records
Pseudonymization for Secondary Use of Cloud Based Electronic Health Records Liangyu Xu 1, Armin B. Cremers 2 and Tobias Wilken 3 Institute of Computer Science III University of Bonn, 53117 Bonn, Germany
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy.
Last Revised: June 23, 2014 1. About this Privacy Policy. PRIVACY POLICY This Privacy Policy is a statement by Active Data, Inc. ( Active Data ) that describes how we collect, store, process, and share
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Empower TM 2 Software
Empower TM 2 Software 21 CFR PART 11 COMPLIANCE ASSESSMENT Revision A, December, 2005 1 of 14 Waters Corporation Note: Information presented in this document assumes that the appropriate Empower 2 System
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
IMPROPER USE OF MEDICAL INFORMATION
IMPROPER USE OF MEDICAL INFORMATION ehealth PRIVACY & SECURITY Presented at 5th Annual National Conference on Healthcare Leadership INNOVATION 2011, Bangalore 26th Jan 2011 Dr Pankaj Gupta ehealth Business
Privacy and Security within an Interoperable EHR
1 Privacy and Security within an Interoperable EHR Stan Ratajczak Director Privacy and Security Solutions Architecture Group November 30, 2005 Electronic Health Information and Privacy Conference Ottawa
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Security in the PEPPOL
Security in the PEPPOL infrastructure Presentation for OASIS BUSDOX TC, March 2011 Thomas Gundel, IT Crew Agenda PART I Security goals in PEPPOL Scope and requirements Security overview PART II Trust models
Bank of Hawaii Protecting Confidential Email
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent
SecTor 2009 October 6, 2009. Tracy Ann Kosa
SecTor 2009 October 6, 2009 Tracy Ann Kosa Privacy versus Security Un enforced Privacy Privacy Requirements that Work People Process Technology Territorial Privacy Setting boundaries on intrusion into
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS
ARCHIVING YOUR DATA: PLANNING AND MANAGING THE PROCESS LIBBY BISHOP. RESEARCHER LIAISON UNIVERSITY OF ESSEX TCRU/NOVELLA SPECIAL SEMINAR - LONDON 29 MAY 2012 THE & ESDS QUALIDATA forty years experience
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
ECRIN (European Clinical Research Infrastructures Network)
ECRIN (European Clinical Research Infrastructures Network) Wolfgang Kuchinke University of Duesseldorf (HHU) and ECRIN EUDAT 1st User Forum 7 March 2012 8 March 2012, Barcelona 1 What is ECRIN? European
Department of State SharePoint Server PIA
1. Contact Information A/GIS/IPS Director Department of State SharePoint Server PIA Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER Copyright 2012 FileHold Systems Inc. All rights reserved. For further information about this manual or other FileHold Systems products,
Forward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Emerging Trends in Health Information Technology: Personal Health Record(PHR) uphr. Nazir Ahmed Vaid ehealth Services (Pvt) Ltd.
Emerging Trends in Health Information Technology: Personal Health Record(PHR) uphr Nazir Ahmed Vaid ehealth Services (Pvt) Ltd. April 26 2012 PROJECT GOALS Design universal health data accessibility on
Clinical Document Exchange Integration Guide - Outbound
Clinical Document Exchange Integration Guide - Outbound Integrate your healthcare IT system with Practice Fusion s Electronic Health Record (EHR) System Table of Contents 1 Introduction... 2 2 Integration
Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the SAF/FM Customer Relationship Management/CRM SAF/FM CRM 1.1 SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
KRS Chapter 61. Personal Information Security and Breach Investigations
KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
Guidance for Data Users on the Collection and Use of Personal Data through the Internet 1
Guidance for Data Users on the Collection and Use of Personal Data through the Internet Introduction Operating online businesses or services, whether by commercial enterprises, non-government organisations
SINTERO SERVER. Simplifying interoperability for distributed collaborative health care
SINTERO SERVER Simplifying interoperability for distributed collaborative health care Tim Benson, Ed Conley, Andrew Harrison, Ian Taylor COMSCI, Cardiff University What is Sintero? Sintero Server is a
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
