SlideShare a Scribd company logo
1 of 52
Access to the health record  Draft report ISO/TC215/WG1 ,[object Object],[object Object],[object Object],[object Object],[object Object]
From the TC215 Scope Statement ,[object Object]
From the WG1 scope statement ,[object Object],[object Object]
From the WG1 scope statement ‘Terms of Reference’ ,[object Object],[object Object],[object Object]
From the resolutions of the WG1 meeting, Tokyo, Nov.’99 ,[object Object],[object Object],[object Object]
Role of WG1 within ISO/TC215 ,[object Object],[object Object],[object Object],[object Object]
Overview ,[object Object],[object Object],[object Object],[object Object]
WG4  defined the task ,[object Object],[object Object],[object Object],[object Object],[object Object]
Beyond reviewing current concepts and practices, the ‘access control’ task for WG1 can thus be re-stated: ,[object Object],[object Object]
(a brief anthropological detour…) The Definition of Social Man  ,[object Object],[object Object],[object Object],[object Object]
The ISO Access Standard -  ,[object Object],[object Object]
The Concept of Ownership ,[object Object],[object Object]
Review of international literature on access to health records ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role Based Access Control (RBAC) ,[object Object],[object Object]
Developing operational concepts and their interrelationships  ,[object Object],[object Object],[object Object],[object Object]
Rules and Roles ,[object Object],[object Object],[object Object]
Self–defining systems ,[object Object],[object Object],[object Object],[object Object]
Maori concepts in Aotearoa/New Zealand ,[object Object],[object Object],[object Object]
The Role concept in Messaging ,[object Object],[object Object],[object Object]
The Role concept in WG4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Minimum ‘Access’ Concept Set ,[object Object],[object Object],[object Object],[object Object],[object Object]
Three irreducible outcomes ,[object Object],[object Object],[object Object],[object Object]
The Access Control Matrix ,[object Object],[object Object],[object Object]
The Generic ACM ,[object Object],[object Object],[object Object],[object Object]
Jurisdictional boundaries ,[object Object],[object Object],[object Object],[object Object]
Requirements for EHR Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
Availability  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Auditablility ,[object Object],[object Object],[object Object]
Data Integrity ,[object Object]
Confidentiality ,[object Object],[object Object]
Interoperability ,[object Object],[object Object]
Accessibility  ,[object Object],[object Object],[object Object]
Policy or Model? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Access Object Model ,[object Object],[object Object],[object Object]
Access Objects 1 ,[object Object],[object Object],[object Object],[object Object]
Access Objects 2 ,[object Object],[object Object],[object Object]
Access Object attributes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Request Object attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To Summarise the process ,[object Object],[object Object],[object Object]
Summary 2 ,[object Object],[object Object]
Summary 3 ,[object Object],[object Object],[object Object]
Integration with WG4 model ,[object Object],[object Object]
The ‘Access Object’ model in UML notation ,[object Object],[object Object],[object Object]
 
 
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Policy or Implementation ,[object Object],[object Object],[object Object],[object Object]
Dangers of ‘de facto’ standards  ,[object Object],[object Object],[object Object],[object Object]
The reality of cultural differences ,[object Object],[object Object],[object Object]
Global interoperability is the goal. What would it be like? ,[object Object],[object Object],[object Object]
We should work to facilitate global healthcare But it will not happen of itself, we would need to decide to do it...

More Related Content

Similar to Dunedin accessppt

Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
LynellBull52
 
Plan, Do, Check, Act - Safety Science
Plan, Do, Check, Act - Safety SciencePlan, Do, Check, Act - Safety Science
Plan, Do, Check, Act - Safety Science
Jules Arntz-Gray
 
Article 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docxArticle 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docx
davezstarr61655
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
ProductNation/iSPIRT
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
woodruffeloisa
 
Catalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncareCatalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncare
~Eric Principe
 
Six Healthcare Trends
Six Healthcare TrendsSix Healthcare Trends
Six Healthcare Trends
MMMTechLaw
 
Secure information sharing (sis) models
Secure information sharing (sis) modelsSecure information sharing (sis) models
Secure information sharing (sis) models
Abu Osama
 

Similar to Dunedin accessppt (20)

Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
Plan, Do, Check, Act - Safety Science
Plan, Do, Check, Act - Safety SciencePlan, Do, Check, Act - Safety Science
Plan, Do, Check, Act - Safety Science
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...
 
09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulation09 4168-international-focus-group-regulation
09 4168-international-focus-group-regulation
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
hsns09:Ethical considerations around telecare-Andrew Eccles
hsns09:Ethical considerations around telecare-Andrew Eccleshsns09:Ethical considerations around telecare-Andrew Eccles
hsns09:Ethical considerations around telecare-Andrew Eccles
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docx
 
Article 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docxArticle 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docx
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
CASCON 2009 - Talk on Interoperability
CASCON 2009 - Talk on InteroperabilityCASCON 2009 - Talk on Interoperability
CASCON 2009 - Talk on Interoperability
 
Вэбінар "Асноўныя індыкатары прыязнасці да сталых людзей"
Вэбінар "Асноўныя індыкатары прыязнасці да сталых людзей"Вэбінар "Асноўныя індыкатары прыязнасці да сталых людзей"
Вэбінар "Асноўныя індыкатары прыязнасці да сталых людзей"
 
Reducing risk protecting people
Reducing risk protecting peopleReducing risk protecting people
Reducing risk protecting people
 
Catalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncareCatalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncare
 
Q&A from ARDC webinar: ‘Data management in NHMRC’s revised National Statemen...
Q&A from  ARDC webinar: ‘Data management in NHMRC’s revised National Statemen...Q&A from  ARDC webinar: ‘Data management in NHMRC’s revised National Statemen...
Q&A from ARDC webinar: ‘Data management in NHMRC’s revised National Statemen...
 
Six Healthcare Trends
Six Healthcare TrendsSix Healthcare Trends
Six Healthcare Trends
 
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
 
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE AP...
 
Secure information sharing (sis) models
Secure information sharing (sis) modelsSecure information sharing (sis) models
Secure information sharing (sis) models
 

More from eyetech

Timeless
TimelessTimeless
Timeless
eyetech
 
Ranzo2010cataract audit
Ranzo2010cataract auditRanzo2010cataract audit
Ranzo2010cataract audit
eyetech
 
Over the rim version 2
Over the rim version 2Over the rim version 2
Over the rim version 2
eyetech
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1
eyetech
 
Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000
eyetech
 
Revised electronic medical record data model
Revised electronic medical record data modelRevised electronic medical record data model
Revised electronic medical record data model
eyetech
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generator
eyetech
 
Mirth measurement
Mirth measurementMirth measurement
Mirth measurement
eyetech
 
The eye in the control of attention
The eye in the control of attentionThe eye in the control of attention
The eye in the control of attention
eyetech
 
The empty box
The empty boxThe empty box
The empty box
eyetech
 
Sydney 2002 plenary final
Sydney 2002 plenary finalSydney 2002 plenary final
Sydney 2002 plenary final
eyetech
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05
eyetech
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)
eyetech
 
Melody of the text2
Melody of the text2Melody of the text2
Melody of the text2
eyetech
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002
eyetech
 
Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3
eyetech
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workflow
eyetech
 
April2010cataract audit
April2010cataract auditApril2010cataract audit
April2010cataract audit
eyetech
 
Acupulco cda access (2)
Acupulco cda access (2)Acupulco cda access (2)
Acupulco cda access (2)
eyetech
 
Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppt
eyetech
 

More from eyetech (20)

Timeless
TimelessTimeless
Timeless
 
Ranzo2010cataract audit
Ranzo2010cataract auditRanzo2010cataract audit
Ranzo2010cataract audit
 
Over the rim version 2
Over the rim version 2Over the rim version 2
Over the rim version 2
 
Acupulco cda access v3-1
Acupulco cda access v3-1Acupulco cda access v3-1
Acupulco cda access v3-1
 
Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000Access report final iso format 29 mar 2000
Access report final iso format 29 mar 2000
 
Revised electronic medical record data model
Revised electronic medical record data modelRevised electronic medical record data model
Revised electronic medical record data model
 
Model of the text generator
Model of the text generatorModel of the text generator
Model of the text generator
 
Mirth measurement
Mirth measurementMirth measurement
Mirth measurement
 
The eye in the control of attention
The eye in the control of attentionThe eye in the control of attention
The eye in the control of attention
 
The empty box
The empty boxThe empty box
The empty box
 
Sydney 2002 plenary final
Sydney 2002 plenary finalSydney 2002 plenary final
Sydney 2002 plenary final
 
Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05Sight, truth and videotape final 12.8.05
Sight, truth and videotape final 12.8.05
 
Health leaders conference (2)
Health leaders conference (2)Health leaders conference (2)
Health leaders conference (2)
 
Melody of the text2
Melody of the text2Melody of the text2
Melody of the text2
 
Sydney 2002
Sydney 2002Sydney 2002
Sydney 2002
 
Over the rim version 3
Over the rim version 3Over the rim version 3
Over the rim version 3
 
Cataract audit as part of workflow
Cataract audit as part of workflowCataract audit as part of workflow
Cataract audit as part of workflow
 
April2010cataract audit
April2010cataract auditApril2010cataract audit
April2010cataract audit
 
Acupulco cda access (2)
Acupulco cda access (2)Acupulco cda access (2)
Acupulco cda access (2)
 
Access standard fppt
Access standard fpptAccess standard fppt
Access standard fppt
 

Recently uploaded

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

Dunedin accessppt

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.  
  • 46.  
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. We should work to facilitate global healthcare But it will not happen of itself, we would need to decide to do it...