Privacy Issues of Provenance in Electronic Healthcare Record Systems



Similar documents
Privacy Issues of Provenance in Electronic Healthcare Record Systems

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606

JOURNAL OF OBJECT TECHNOLOGY

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange

Patterns of Information Management

Information Sharing Policy

DARTFISH PRIVACY POLICY

GSK Public policy positions

Scotland s Commissioner for Children and Young People Records Management Policy

Use Cases for Argonaut Project. Version 1.1

Council Policy. Records & Information Management

Cloud Computing and Privacy Laws! Prof. Dr. Thomas Fetzer, LL.M. Technische Universität Dresden Law School

A Secure Autonomous Document Architecture for Enterprise Digital Right Management

MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER

EDG Project: Database Management Services

UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.

Bodywhys Privacy Policy

Reporting trends and pain points of current and new customers IBM Corporation

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

Electronic Health Record (EHR) Standards Survey

INTEGRATING RECORDS MANAGEMENT

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Gaming System Monitoring and Analysis Effort

Life Cycle of Records

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version Fix Pack 2.

Advanced Document Management in an integrated environment

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

Using Provenance to Improve Workflow Design

Information Management

Self-Protecting Documents for Cloud Storage Security

Copyright Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement

DISASTER RECOVERY INSTITUTE CANADA WEBSITE PRIVACY POLICY (DRIC) UPDATED APRIL 2004

Privacy and Transparency for Decision Making. Simone Fischer-Hübner Karlstad University, Sweden MDAI 2015

Privacy Policy and Notice of Information Practices

itrust Medical Records System: Requirements for Technical Safeguards

IT Privacy Certification

Master Data Management

Records Management Policy

The purpose of this document is to provide a framework for ConnectGroups in dealing with privacy considerations.

AHIMA Curriculum Map Health Information Management Associate Degree Approved by AHIMA Education Strategy Committee February 2011

ACCESS TO MEDICAL RECORDS. By Felicia Jolaoye Blavo & Co Solicitors Ltd.

Mona Osman MD, MPH, MBA

Hansken job scheduler: Definition of business rules according to the MBRM framework. July 6th, R. van Baar (NFI)

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Collection and Use of Information

4.04: Preparing for Preparing for a JCAHO Survey of a Hospital's HIPAA Privacy and Security Compliance Program

IBM DB2 CommonStore for Lotus Domino, Version 8.3

Effective Contract Management

IBM Software. IBM Initiate: Delivering Accurate Patient and Provider Identification for Canadian Electronic Health Records

Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS Risk Assessment 357-7

PRESIDENT S DECISION No. 40. of 27 August Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)

Security Information & Policies

Digital Assets Repository 3.0. PASIG User Group Conference Noha Adly Bibliotheca Alexandrina

Requirements of Secure Storage Systems for Healthcare Records

1. Understanding Big Data

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

7i Imaging on Demand PACS Solution FAQ s

Approaches for Cloud and Mobile Computing

Protect, Share, and Distribute Healthcare Data with ehealth Managed Services

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Applying Information Lifecycle Management Strategies Enables Healthcare Providers to Accelerate Clinical Workflow

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

HOW WILL BIG DATA AFFECT RADIOLOGY (RESEARCH / ANALYTICS)? Ronald Arenson, MD

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cloud Computing ISO Security and Privacy Standards: 27017, 27018, Mike Edwards (Chair UK Cloud Standards Committee)

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Manual 074 Electronic Records and Electronic Signatures 1. Purpose

Data Grids. Lidan Wang April 5, 2007

Knowledge Management and Collaboration Analysis of the Siemens Healthcare Consulting Group

Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.

Transcription:

Tamás Kifor, László Z. Varga, Sergio Álvarez, Javier Vázquez-Salceda, Steven Willmott in Electronic 1

Introduction (1) l advantages of agent based techniques in healthcare information systems: coordination, personalization, dynamic, decentralized, etc. l but: indivisible healthcare history and therapy of the patient is allocated to independent and autonomous healthcare institutions l reunification of the different pieces of the therapy of a single patient executed at different places is based on ad-hoc methods and the information provided by the patient 2

Introduction (2) l provenance of electronic data in service oriented architectures: enable users to trace how a particular result has been produced by identifying the individual and aggregated services that produced a particular output l organ transplant application of the project: we propose the usage of provenance techniques to provide better healthcare services for patients by providing a unified view of the whole health treatment history 3

Introduction (3) l As long as the treatment and the data are distributed among the agents of the healthcare information system, privacy protection is focused on the protection of partial information pieces l with the introduction of provenance into the system we re-integrate the different pieces l our goals: l investigate the privacy aspects of introducing provenance into healthcare information systems l propose methods against the new types of risks 4

Distributed and Heterogeneous EHCR Applications (1) l fragmented and heterogeneous data resources and services forming islands of information l the corresponding workflow chunks are distributed among these islands of information l the treatment of the patient might require viewing these pieces of workflow and data as a whole 5

Distributed and Heterogeneous EHCR Applications (2) l ENV 13606 pre-standard developed by CEN/TC251 (European Committee of Normalisation, Technical Committee 251) is vital for the exchange of clinical data l EHCR architecture defines how to exchange data, but the linking of the workflow pieces which generated the data is not discussed in EHCR standards l provenance architecture helps to document the way the data was created and link the workflow pieces together 6

Electronic s and Case Antecedents l In order to pull together the medical history of a patient we have essentially three options: l Build a system mirroring the current one based on fragments of records in different places which can be pulled together to produce a unified view on demand (depending on the permissions of the viewer). l Build a system of a more centralised nature with a master record which can be read and written to by authorised healthcare providers (in a controlled fashion) and possible cached at a particular healthcare provider. l Build a hybrid system which stores fragments of data with providers but records high level events in a central master record. 7

in Service Oriented Architectures l provenance: the provenance of a piece of data is the process that led to the data l provenance of a piece of data will be represented in a computer system by some suitable documentation (a a set of p-assertions) l provenance lifecycle: l actors create p-assertionsp l p-assertions are stored in a provenance store l users or applications can query the provenance store l the provenance store and its contents can be managed 8

Organ Transplant Management Application 9

Issues l disclosures are necessary to treat patients, process claims, measure outcomes, and fight disease l privacy protection should not be focused on nondisclosure, but on controlled and irreversible disclosure l which mainly means the protection of the identity of the patient 10

in Management l technical measures that must be taken l separation must ensure that no unauthorized person can connect the identity of the patient with his medical or genetic data l data must be protected against any kind of unauthorized processing l unauthorized inputs, queries, modifications or deletions of the data while they are stored in the computer memory of the information system, as well as while the data are sent through the network from a computer to another, must be avoided l no unauthorized access l protect the data against accidental destruction and loss l access and data input logging 11

and (1) l we e introduce an additional agent type into the system: the provenance agent l healthcare agents give up part of the control over the data, the autonomy of the healthcare information is shared with the provenance store l provenance store is then able to link data and the workflow pieces that generated the data l the provenance system helps the integration of the information islands which raises additional privacy risks 12

and (2) l for provenance we need as much information as possible about the whole process to be able to trace back all that has happened l for privacy we need to restrict as much as possible the information available in order to avoid identification of patients and practitioners by unauthorised users l we identified two main risks: l cross-link risk: : the risk that unauthorised users are able to link some piece of medical data with an identifiable person by cross-linking information from different sources l event trail risk: : the risk to be able to identify a person by connecting the events and actions related to that person 13

Protecting in the OTM Application l event trail risk: information not available in the healthcare information system has to be matched with the information in the healthcare information system => requires more effort and information to exploit l cross-link risk: can be exploited using information available only in the healthcare information system => we focus on this l techniques to reduce the cross-link risk: l we do not put medical data in the provenance store l we anonymise the patient data 14

Medical Data and the Store (1) l Can we put medical data into p-assertions p which will be stored within provenance stores? l Can we put person identifiers into p-assertions? p l Is it enough if we anonymise patients in p-p assertions? l How can we safely anonymise the patient? l If we do not store medical information in the provenance store, then how can we retrieve the provenance of medical data? 15

Medical Data and the Store (2) l we dod not store sensitive medical data in the provenance store, but only references to such data l public identifiers of patients are not stored in the provenance store, only anonymised identifiers are used l the provenance store contains only the linkage and the skeleton of the provenance of the medical data, and the healthcare data can be laid on the skeleton by retrieving it from the healthcare information system when needed l retrieval is done by an EHCR system which is completely under the control of EHCR access rules 16

Anonym Identity in the Store (1) l the fact that the patient was treated or the place of treatment,, can be sensitive information => at least the patient identity has to be anonymised l anonymisation process requirements: l if f two sets of p-assertions p are related to the same patient, then there should be a way to link anonymised patient identifiers referring to the same patient in the different sets of p-assertionsp l anonymisation procedure should be irreversible l as s a consequence, no component in the system should store the real identifier of the patient and its anonymised identifier together 17

Anonym Identity in the Store (2) l in the OTM application the EHCRS system applies anonymous case identifiers l to connect different cases: l we store case identifiers in the p-assertions p and define relationships between them (the physician says that the current case is related to a previous one), or l we use a global anonymous tracer of the patient and connect each case identifier to that anonymous tracer in p-p assertions (helps to connect cases which are not explicitly known) 18

Conclusion l provenance may increase the quality of medical services by providing a unified view of the medical history of patients l but raises new privacy issues which we investigated l we e identified two new privacy risks l we e reasoned that the most critical of these risks is the cross-link risk and proposed methods to eliminate this risk l we are working on the implementation of the OTM application with provenance extension and we are implementing the outlined privacy protection methods l privacy issues investigated and methods proposed may be relevant beyond the specific implementation discussed here 19

Acknowledgements l IST-2002 2002-511085 project l IBM United Kingdom Limited, l University of Southampton, l University of Wales, Cardiff, l Deutsches Zentrum fur Luft- und Raumfahrt s.v, l Universitat Politècnica de Catalunya, l MTA SZTAKI l Javier Vázquez-Salceda s work has been also partially funded by the Ramón n y Cajal program of the Spanish Ministry of Education and Science 20