Secondary Use of the EHR via Pseudonymisation
|
|
|
- Adela Fitzgerald
- 10 years ago
- Views:
Transcription
1 Secondary Use of the EHR via Klaus POMMERENING Institut für Medizinische Biometrie, Epidemiologie und Informatik Johannes-Gutenberg-Universität D Mainz, Germany Michael RENG Klinik und Poliklinik für Innere Medizin I Klinikum der Universität D Regensburg, Germany Abstract. The Electronic Health Record (EHR) has many secondary uses, such as health economy and health care research, or disease specific clinical or epidemiological research. For these uses in general the patient identity is not needed, therefore the data must be anonymised or pseudonymised. Whereas for one-time use of the data this procedure is straightforward, long-term data accumulation or the necessity of re-identification require a more sophisticated approach. This paper describes possible model architectures, developed for medical research networks, but useful in other contexts as well. Introduction The Electronic Health Record (EHR) is primarily used in the treatment context; here the identity data of the patient are needed and their processing is allowed. But the EHR also serves as a basis for secondary uses such as disease specific clinical or epidemiological research projects, health care research, assessment of treatment quality, health economy. Typical aspects of these secondary uses are that the data leave the context of the physician where they are protected by professional discretion, the identity of the patient doesn't matter. In such a context use of the data is allowed after anonymisation; therefore anonymisation should be performed whenever possible. But this is not always possible: In many cases of secondary use the correct association between a single patient's data from distinct sources or distinct points of time is essential. In some scenarios even a way back to the identity is required; it could be important for the patient, and be in his interest, to learn about results of a research project, for example a genetic disposition; or a researcher might want to use a data pool to recruit suitable patients for a new clinical or epidemiological study.
2 Pseudonyms are the solution of these problems [1]. They represent the golden mean between perfect anonymity and exposing the identity data. Depending on the requirements one of two kinds of pseudonyms can be used: one-way pseudonyms, that cannot be reversed but allow record linkage, reversible pseudonyms, that allow the re-identification of the individual. The use of reversible pseudonyms requires that the re-identification depends on a secret key and the pseudonymisation process is set up as a Trusted Third Party (TTP) service; see below. Moreover the use of a system that makes re-identification possible is allowed only after an explicit informed consent by the patient. The technique of pseudonyms in information processing is not new, however rarely used as yet. Early examples are the untraceable electronic money (Chaum 1982 [2]) whose implementation by several banks was withdrawn, the electronic prescription (Struif ca 1990 [3]) and the pseudonymous settling of bills in health care (Pommerening, Bleumer, Schunter 1995 [4]) that were never implemented, and the Michaelis-Pommerening model [5] of cancer registry that is in actual use in several German states. Several recent German laws require pseudonymisation in appropriate contexts. In her review of the first medical Competence Networks in Germany, the data protection commissioner of Nordrhein-Westfalen stated the following requirements (among others) [6]: Central data pools must only contain anonymous or at least pseudonymous data. A trusted third party ( Datentreuhänder ) that is protected by law (e. g. a notary) should carry out the pseudonymisation. The use of unique patient identifiers across distinct networks is not allowed. The TMF the Telematics Platform for the Medical Research Networks of the Federal Ministry of Education and Research therefore started a project to develop and implement generic models for pseudonymisation that can be used in research networks, but in other health care scenarios as well. 1. Models of We distinguish several scenarios where distinct procedures for anonymisation or pseudonymisation are appropriate. In particular for the long-term accumulation of patient data the TMF proposes two models, see sections 1.4 and 1.5; they differ with respect to the location of the data pool within the overall architecture. There are technically more elegant procedures for pseudonymisation, based on blind signatures as proposed by Chaum [2]; they assume that the pseudonym owner is also the key owner and controls the use of the pseudonym. However these procedures don t fit the needs and data flows of secondary uses of the EHR, neither for one-time uses nor for building a data pool, and are not used in the context of this paper. Here a pseudonym is an encrypted patient identifier. 1.1 Single Data Source, One-Time Secondary Use This is the typical application case for anonymisation and is well-understood. As an example take a simple statistical evaluation of EHR data.
3 1.2 Overlapping Data Sources, One-Time Secondary Use Here the data from diverse sources must be linked together. Think of a multi-centric study that uses data from EHRs, but also data or probes from a biomaterial bank, or follow-up data at a later point in time. This is the typical application case for one-way pseudonyms. An essential prerequisite is a unique patient identifier (PID) in the EHR and the other data sources. The pseudonymisation procedure then consists of a one-way encryption of the PID, and should be implemented as a TTP service. A typical feature of this service is the use of asymmetric encryption: The data source encrypts the medical data with the key of the secondary user and sends the PID (not the identity data) as well as the encrypted medical data to the pseudonymisation service that encrypts the PID and sends it to the secondary user, together with the encrypted medical data. Note that the TTP cannot read the medical data, only the secondary user can decrypt them. But he cannot decrypt the pseudonym. Figure 1 shows the data flow; stands for the medical data, IDAT for the identity data, and PSN for the pseudonym. Data Source(s) encrypted Service PID PSN Secondary Use PSN encrypt (one-way) Figure 1. Data Flow for One-Time Secondary Use Because the pseudonymisation service doesn t store the association between PIDs and pseudonyms, and cannot reverse the encryption, there is no need to treat the PID as secret, as long as the TTP implements an effective sender authentication and authorisation that prevents a trial encryption attack. There was a TMF project that implemented this model in a health care research project [7], where it is routinely used since One-Time Secondary Use with the Need of Re-identification The conceptually simplest model of pseudonymisation with possible re-identification uses a reference list located at a trusted third party; in this model there is a big file containing patient identities and associated pseudonyms. This file is an attractive target for attacks and constitutes a single point of failure of the security concept. Moreover it stores patient identities outside of the proper treatment context and therefore violates the professional discretion of the participating physicians. Therefore a refined reference list model is most suited, that extends the model in 1.2. It involves a two-step procedure for pseudonymisation and several keys and TTP services. First we need a PID that is not a public universal identifier (such as Patient Number, Insurance Number), but is project specific and is generated by a separate TTP service. This
4 service stores the patient list the association between identity data and PIDs; moreover it is responsible for the correct linkage between data from different sources. The PID is stored at the data source(s) but kept confidential. The pseudonymisation service works as a second TTP service and acts as in 1.2 but applies a reversible encryption procedure. Figure 2 shows the essential components of the data flow. The pseudonymisation service doesn t store the association between PID and pseudonym not even the association between PID and data source but can restore the PID from the pseudonym at any time with the help of its secret encryption key. For reidentification also the PID service is involved; it associates the PID with the identity data and notifies the data source. Data Source(s) encrypted Service PID PSN Secondary Use PSN PID Service encrypt/ decrypt Figure 2. Data Flow with Possible Re-identification 1.4 Pseudonymous Research Data Pool A new level of requirements appears with the need of long-term data accumulation, for example in building a disease specific registry. The Model B of the TMF uses the same procedure as in 1.3; the only additional feature is that on the Secondary Use side the data are collected in a data pool. This data pool is available for research projects. What projects may get access, depends on the situation, but as a rule the projects must be associated to the specific health care or research network by contracts; the data pool must not be a selfservice database for arbitrary projects. The data flow is basically the same as in 1.3, except that the Secondary Use is replaced by the Data Pool that permanently stores pseudonym and medical data and offers them for (possibly many) secondary uses. Because after pseudonymisation the quality assurance of the data would be much more difficult, careful quality management should precede pseudonymisation. This is the task of yet another TTP service. Note that depending on the data protection policy some of the TTP services might be offered by the same trusted third party. 1.5 Central Clinical Data Base, Many Secondary Uses The alternative Model A of the TMF uses a somewhat different approach that better fits the needs of research networks with a clinical focus. It supports the long-term observation of patients with chronic diseases, and facilitates the individual feedback of
5 research results to the patient or to the responsible physician. This model introduces a central clinical database as a TTP service with online access for the treating clinician who is also responsible for the quality of the data. The clinical database contains no identity data, but only the PID instead; the reference in the case of authorised access is established via the patient list. Additional data sources, for example biomaterial banks, use distinct references (LabID). If a research project needs data from this pool, the appropriate data set is exported in anonymised form or pseudonymised by a TTP with a project specific key; that means, different projects get different pseudonyms. Figure 3 shows the essential components of the data flow. Central Database Service Local Database PID Export PID PSN IDAT Patient List PSN Secondary Use Figure 3. Data Flow for Model A Note that Model A requires the implementation of sophisticated communication procedures. For example to access the data in the central data base, the participating physician gets temporary tokens that enable her to view or update her own data. 2. Results The TMF Working Group on Data Protection developed the models A and B in close collaboration with the German Data Protection Commissioners ( Arbeitskreis Wissenschaft der Datenschutzbeauftragten des Bundes und der Länder ). The final version was consented by the Data Protection Commissioners ( Arbeitskreis Wissenschaft and Arbeitskreis Gesundheit ). The TMF WG supports medical research networks with advice on adapting the generic models to their specific needs. Some networks already implemented one of the models, some other networks are in the process of implementation. To support the implementation the TMF developed appropriate software tools for the specified communication paths and the involved TTP services. Moreover it provides sample forms for the patient s consent, as well as policies and sample contracts for the participating members of the networks or projects.
6 3. Discussion The TMF model architecture with its two variants provides ways for building medical research networks and central data pools that conform to the German and European data protection rules, respect the patients rights, and cover a wide range of situations. The transfer to other scenarios in health care is possible and recommended. The generic TMF architecture is not a static structure. There are practical experiences and feedback from implementations, but also changing requirements in health care research and medical networks, for example with respect to genetic research. Therefore the TMF must continually keep its models up to date to meet new challenges. Acknowledgement This work was supported by the Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF) as a project of the TMF and of the Competence Networks Pediatric Oncology and Haematology, Chronic Inflammatory Bowel Disease, Systemic Inflammatory Rheumatic Diseases, and Acute and Chronic Leukaemia. References [1] K. Pommerening: Pseudonyme - ein Kompromiß zwischen Anonymisierung und Personenbezug. In: H. J. Trampisch, S. Lange (Hrsg.), Medizinische Forschung - Ärztliches Handeln, 40. Jahrestagung der GMDS, Bochum, September 1995, MMV Medizin-Verlag, München 1995, [2] D. Chaum: Security without identification: Transaction systems to make Big Brother obsolete. Communications of the ACM 28 (1985), [3] B. Struif: Datenschutz bei elektronischen Rezepten und elektronischem Notfallausweis. In: Vertrauenswürdige Informationstechnik für Medizin und Gesundheitsverwaltung. Erfurt: TeleTrusT Deutschland e. V., 1994: 15/1 6. [4] G. Bleumer, M. Schunter: Datenschutzorientierte Abrechnung medizinischer Leistungen. Datenschutz und Datensicherheit 2 (1997), [5] K. Pommerening, M. Miller, I. Schmidtmann, J. Michaelis: Pseudonyms for cancer registry. Methods of Information in Medicine 35 (1996), [6] Die Landesbeauftragte für den Datenschutz in Nordrhein-Westfalen: 15. Datenschutzbericht 1999/2000. [7] P. Ihle: Implementierung eines Pseudonymisierungsdienstes für versichertenbezogene Daten der gesetzlichen Krankenversicherung. Informatik, Biometrie und Epidemiologie 33 (2002), [8] M. Reng, P. Debold, K. Adelhard, K. Pommerening: Generische Lösungen der TMF zum Datenschutz für die Forschungsnetze der Medizin. Shaker-Verlag, Aachen 2004.
Secondary Use of the EHR via Pseudonymisation
Secondary Use of the EHR via Pseudonymisation Klaus Pommerening, Mainz Michael Reng, Regensburg TMF = Telematikplattform für die medizinischen Forschungsnetze [Telematics Platform for the German Health
Patient Records: Challenges for and Approaches to Safety and Security
Patient Records: Challenges for and Approaches to Safety and Security Klaus Pommerening IMBEI, Universitätsmedizin Mainz ehealth Workshop, London, 16 June 2011 5 Challenges of ehealth for the Next Years
Annette Pollex-Krüger, Johannes Drepper, Sebastian C. Semler. Telematikplattform für Medizinische Forschungsnetze (TMF) e.v.
TMF A Common Platform for Medical Research Networks in Germany Improving the Organisation and Infrastructure of Medical Research in Cooperative Structures ELN Workshop on Information Technology II Heidelberg,
The Blood Donor BIOBANK
The Blood Donor BIOBANK the first successful combination of blood donation and biobanking for medical research 1 1 Zoglmeier et al., TRANSFUSION 2011, 51(5): 1121-1122 Dr. Franz Weinauer SWISSTRANSFUSION
De-identification of Data using Pseudonyms (Pseudonymisation) Policy
De-identification of Data using Pseudonyms (Pseudonymisation) Policy Version: 2.0 Page 1 of 7 Partners in Care This is a controlled document. It should not be altered in any way without the express permission
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century
SWABIK Project. Software Tools for DICOM Media Exchange in Clinical Research: the. SWABIK Project
Software Tools for DICOM Media Exchange in Clinical Research: the SWABIK Project Software Tools for DICOM Media Exchange in Clinical Research: the SWABIK Project O. ElGazzar 1, M. Onken 1, M. Eichelberg
Continuity of Care Record (CCR) in Germany? PROREC activities on the way to EHR interoperability
Herzlich Willkommen! EHTEL Telemed ehealth IOP Satellite Heidelberg, 12 June 2008 Continuity of Care Record (CCR) in Germany? PROREC activities on the way to EHR interoperability Sebastian Claudius Semler
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01
VERSION 2.50 (ehc) elektronische Gesundheitskarte (egk) BSI-PP-0020-V2-2007-MA01 Approved by the Federal Ministry of Health Version 2.50, 2 nd January 2008 Version 2.50, 2nd January 2008 this page was
UNIVERSITÄTSBIBLIOTHEK
UNIVERSITÄTSBLIOTHEK Zeitschriften im Abonnement Fach: Informatik : Elektronische Zeitschriften finden Sie in der Elektronischen Zeitschriftenbibliothek EZB. Standort : Bereichsbibliothek Informatik Standort
Registries: An alternative for clinical trials?
Registries: An alternative for clinical trials? Prof. Dr. Joerg Hasford, M.D., Ph.D. Department of Medical Informatics, Biometry and Epidemiology Ludwig-Maximilians-Universität Email: [email protected]
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
4.2 Progress report of subproject 2
4.2 Progress report of subproject 2 Project title: Project leaders: Telematics and computer-based quality management in a communication network for malignant lymphomas Dr. Barbara Heller Prof. Dr. Markus
ECRIN (European Clinical Research Infrastructures Network)
ECRIN (European Clinical Research Infrastructures Network) Wolfgang Kuchinke University of Duesseldorf (HHU) and ECRIN EUDAT 1st User Forum 7 March 2012 8 March 2012, Barcelona 1 What is ECRIN? European
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Information & Communication Security (SS 15)
Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda
From metabiobanks to translational research platforms: Integrating Big Data through CRIP Tools
From metabiobanks to translational research platforms: Integrating Big Data through CRIP Tools 4 th Munich Biomarker Conference, November 26, 2014 [email protected] Access to goods
The communication concept of a regional stroke unit network based on encrypted image transmission and the DICOM-Mail standard
CARS/Springer. All rights reserved. 612 The communication concept of a regional stroke unit network based on encrypted image transmission and the DICOM-Mail standard Engelmann U a, Schroeter A a, Schweitzer
Network Security. Chapter 14. Security Aspects of Mobile Communications
Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Biobank Alliance. H.-Erich Wichmann. English version. Helmholtz Zentrum München LMU München
m 4 Biobank Alliance H.-Erich Wichmann English version Helmholtz Zentrum München LMU München Nationale Biobank Initiative Kickoff-Meeting 8. April 2011 TMF Berlin m 4 personalized medicine and target-orientated
Common Criteria Protection Profile. electronic Health Card (ehc) elektronische Gesundheitskarte (egk)
electronic Health Card (ehc) elektronische Gesundheitskarte (egk) BSI-CC-PP-0020-V3-2010-MA-01 Approved by the Federal Ministry of Health Version 2.9, 19th April 2011 electronic Health Card Version 2.9,
Payment authorization Payment capture Table 1.3 SET Transaction Types
Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration
ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian
Wiener Biometrische Sektion (WBS) der Internationalen Biometrischen Gesellschaft Region Österreich Schweiz (ROeS) http://www.meduniwien.ac.
Wiener Biometrische Sektion (WBS) der Internationalen Biometrischen Gesellschaft Region Österreich Schweiz (ROeS) http://www.meduniwien.ac.at/wbs/ WBS Sommer Seminar 2014 jointly organized with CeMSIIS-ReUSe
Overview of the national laws on electronic health records in the EU Member States National Report for Lithuania
Overview of the national laws on electronic health records in the EU Member States and their interaction with the provision of cross-border ehealth services Contract 2013 63 02 Overview of the national
The Integrated Data Repository Toolkit (IDRT)
2 nd European i2b2 AUG Meeting The Integrated Data Repository Toolkit (IDRT) Platform Architecture And Tools to Support The Re-use of Routine Clinical Data For Research Christian Bauer (presenter), Benjamin
Overview of the EHR4CR project Electronic Health Record systems for Clinical Research
Overview of the EHR4CR project Electronic Health Record systems for Clinical Research Dipak Kalra UCL on behalf of the EHR4CR Consortium ENCePP Plenary Meeting, 3rd May 2012, London The problem (as addressed
Investigation of the effect of isomaltulose (PalatinoseTM) on metabolic parameters in subjects with Type 2 Diabetes.
PLEASE NOTE: This trial has been registered retrospectively. Trial Description Title Investigation of the effect of isomaltulose (PalatinoseTM) on metabolic parameters in subjects with Type 2 Diabetes.
The Legal Classification of Identity-Based Signatures
The Legal Classification of Identity-Based Signatures Christoph Sorge University of Paderborn 33098 Paderborn, Germany [email protected] Abstract Identity-based cryptography has attracted
How To Protect Your Data From Being Hacked On An Idm System
Privacy Enhancing Identity Management: Protection Against Re-identification and Profiling Sebastian Clauß TU Dresden Fakultät Informatik D-01062 Dresden, Germany [email protected] Dogan Kesdogan RWTH
Recognition and Privacy Preservation of Paper-based Health Records
Quality of Life through Quality of Information J. Mantas et al. (Eds.) IOS Press, 2012 2012 European Federation for Medical Informatics and IOS Press. All rights reserved. doi:10.3233/978-1-61499-101-4-751
HL7 Clinical Document Architecture (CDA)
HL7 Clinical Document Architecture (CDA) and its Sciphox implementation in Germany Dr. Kai U. Heitmann M.D. University of Cologne (Germany) Institute for Medical Statistics, Informatics und Epidemiology
Modes of Operation of Block Ciphers
Chapter 3 Modes of Operation of Block Ciphers A bitblock encryption function f: F n 2 Fn 2 is primarily defined on blocks of fixed length n To encrypt longer (or shorter) bit sequences the sender must
Ontology based Recruitment Process
Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany [email protected]
Chapter 37. Secure Networks
Chapter 37 Network Security (Access Control, Encryption, Firewalls) Secure Networks Secure network is not an absolute term Need to define security policy for organization Network security policy cannot
ADVISORY GUIDELINES FOR THE HEALTHCARE SECTOR 11 SEPTEMBER 2014
ADVISORY GUIDELINES FOR THE HEALTHCARE SECTOR 11 SEPTEMBER 2014 1 PART I... 4 1 Introduction... 4 PART II: APPLICATION OF THE DATA PROTECTION PROVISIONS TO SCENARIOS FACED IN THE HEALTHCARE SECTOR... 5
Medical Care in Germany
edited and published by Dr. Karel Kostev Dr. Gabriele Haas Medical Care in Germany Epidemiology, Health Economics and Outcome Research with IMS Patient Databases 3 Bibliografische Information der Deutschen
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Data Analytics in Health Care
Data Analytics in Health Care ONUP 2016 April 4, 2016 Presented by: Dennis Giokas, CTO, Innovation Ecosystem Group A lot of data, but limited information 2 Data collection might be the single greatest
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages.
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its certification service D
Informatics: Opportunities & Applications. Professor Colin McCowan Robertson Centre for Biostatistics and Glasgow Clinical Trials Unit
Informatics: Opportunities & Applications Professor Colin McCowan Robertson Centre for Biostatistics and Glasgow Clinical Trials Unit Routine Data "routine data" is data collected as byproducts of clinical
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Avastin in Metastatic Breast Cancer
Non-interventional study Avastin in Metastatic Breast Cancer ML 21165 / 2007 Clinical Study Report Synopsis ROCHE ML21165 / WiSP Project RH09 / V. 1.0 / 24.06.2013 ROCHE ML21165-2 - Name of Sponsor Roche
The research data centres of the Federal Statistical Office and the statistical offices of the Länder
Schmollers Jahrbuch 124 (2004), 567 578 Duncker & Humblot, Berlin The research data centres of the Federal Statistical Office and the statistical offices of the Länder By Sylvia Zühlke, Markus Zwick, Sebastian
Prospective multicenter study for functional evaluation of transoral laser microsurgery (TLM) for supraglottic carcinomas - SUPRATOL
Trial Description Title Prospective multicenter study for functional evaluation of transoral laser microsurgery (TLM) for supraglottic carcinomas - SUPRATOL Trial Acronym SUPRATOL URL of the trial [---]*
Information Governance and Risk Stratification: Advice and Options for CCGs and GPs
Information Governance and Risk Stratification: Advice and Options for CCGs and GPs 1 NHS England INFORMATION READER BOX Directorate Medical Operations Patients and Information Nursing Policy Commissioning
NOTICE OF PRIVACY PRACTICES
THE PHYSICIAN PRACTICE, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW
Pseudonymization for Secondary Use of Cloud Based Electronic Health Records
Pseudonymization for Secondary Use of Cloud Based Electronic Health Records Liangyu Xu 1, Armin B. Cremers 2 and Tobias Wilken 3 Institute of Computer Science III University of Bonn, 53117 Bonn, Germany
Qualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
Biometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
Single Source Information Systems to Connect Patient Care and Clinical Research
Medical Informatics in a United and Healthy Europe K.-P. Adlassnig et al. (Eds.) IOS Press, 2009 2009 European Federation for Medical Informatics. All rights reserved. doi:10.3233/978-1-60750-044-5-61
Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance
QIPP Digital Technology Electronic Palliative Care Co-Ordination Systems: Information Governance Guidance Author: Adam Hatherly Date: 26 th March 2013 Version: 1.1 Crown Copyright 2013 Page 1 of 19 Amendment
Reasoning / Medical Context / Physicians Area of Competence
Medical Informatics Learning Objectives for Undergraduate Medical Education created by the project group "Medical Informatics Education in Medicine" (chairs: M. Dugas, J. Stausberg) of the German Association
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Personal Data Handling and Sharing Policy
Personal Data Handling and Sharing Policy Originator Richard Gibson Date 20 June 2012 Verifier Lynda Oliver Date 20 June 2012 Reviewed Richard Gibson, Lynda Oliver Date July 2013 Contents Page 1. Introduction
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*
A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Universität München Fakultät für Informatik Lehrstuhl für Wirtschaftsinformatik (i17) Sebastian Dünnebeil Helmut Krcmar
Universität München Fakultät für Informatik Lehrstuhl für Wirtschaftsinformatik (i17) Sebastian Dünnebeil Helmut Krcmar Market Engineering for Electronic Health Services Technische Universität München
Integration of Sustainable Approaches in the Building Design Process
Integration of Sustainable Approaches in the Building Design Process U. Forgber, N. Kohler, V. Koch, University of Karlsruhe Englerstrasse 7 76128 Karlsruhe, Germany F. Schmidt, R. Haller, University of
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Dr. Jens Heider Head of Department Testlab Mobile Security Amt für Wirtschaft und Stadtentwicklung,
An Approach to introduce Privacy by Design in Agile App-Development. Martin Degeling, [email protected] Kai-Uwe Loser, kai-uwe.loser@rub.
An Approach to introduce Privacy by Design in Agile App-Development Martin Degeling, [email protected] Kai-Uwe Loser, [email protected] 1 2 3 appification Often developed in short time with small
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Principles for Responsible Clinical Trial Data Sharing
Principles for Responsible Clinical Trial Data Sharing Our Commitment to Patients and Researchers Biopharmaceutical companies are committed to enhancing public health through responsible sharing of clinical
Evaluation of the Secondary Use approach
Ruprecht-Karls-Universität Heidelberg / Hochschule Heilbronn Diplomstudiengang Medizinische Informatik September 12, 2011 DIPLOMA THESIS Evaluation of the Secondary Use approach from Vanderbilt and its
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Council of the European Union Brussels, 15 January 2015 (OR. en) NOTE German delegation Working Party on Information Exchange and Data Protection
Council of the European Union Brussels, 15 January 2015 (OR. en) Interinstitutional File: 2012/0011 (COD) 14705/1/14 REV 1 LIMITE DATAPROTECT 146 JAI 802 MI 805 DRS 135 DAPIX 150 FREMP 178 COMIX 568 CODEC
