SlideShare a Scribd company logo
1 of 29
Download to read offline
2006
Intelligent Information Systems
From Lip-Service to Action:
Improving Healthcare Privacy Practices
Tyrone Grandison & Rafae Bhatti
IBM Almaden Research Center
{rbhatti,tyroneg}@us.ibm.com
Information Management
Outline
 Introduction
 Background
– HIPAA Requirements
– P3P and Privacy Policies
 Healthcare Privacy Policies Survey
 Privacy Management Architecture
 Conclusion
Information Management
Introduction
 Privacy concerns main inhibitors to use and deployment of electronic
health records
– Concerns about loss of reputation resulting from privacy breaches
translating into increased spending on healthcare privacy compliance
– In US, HIPAA is assumed to provide baseline for healthcare privacy
protection
 However, impact of adoption of privacy policies on improvement of
privacy practices remains to be ascertained
– The answer lies in the design and enforceability of policy
Information Management
Highlight of Issues
 Policy Design
– Policy designed to cover relevant provisions of regulation but still vague
enough to offer little privacy protection
 Broadly-defined purposes
 Umbrella authorizations
 Lax enforcement
– Policy is often bypassed or subverted during regular operation
Concerns have begun to emerge at national level
– Robert Pear. Warnings over Privacy of US Health Network. New York
Times, February 18, 2007.
Information Management
Why does this situation need improvement?
 It puts you, the patient, at risk
– Results in false sense of privacy
 Purported compliance with privacy regulations
– Undermines the notion of empowering the patient
 Consent to a policy not a genuine reflection of privacy practices
 It makes the existence of a policy insignificant
– A policy does not reveal a company’s true stance on data protection
Information Management
Our Contributions
 Survey of HIPAA-inspired policies of 20 healthcare organizations
– Investigate how stated privacy policies measure up to the level of
protection needed to truly ensure patient data
 PRIvacy Management Architecture (PRIMA)
– Enables refinement of privacy policies based on actual practices of an
organization
Information Management
Goals of Policy Refinement
 Improve the design of policies to elevate the level of privacy protection
afforded to the patient
 Elevate current system from one that purports regulatory compliance to one
that proactively safeguards patient healthcare data
 Better align the policies with actual privacy practices of the organization
Information Management
Outline
 Introduction
 Background
– HIPAA Requirements
– P3P and Privacy Policies
 Healthcare Privacy Policies Survey
 Privacy Management Architecture
 Conclusion
Information Management
The Privacy Space Around the World
 Canada: Personal Information Protection and Electronic Documents Act
(PIPEDA)
 Japan: Personal Data Protection Law
 EU Directives on Data Protection
 US: HIPAA
To ground our discussion, we focus on HIPAA Privacy Rule
Information Management
HIPAA Requirements
 Terms:
– Covered Entities: Health Care Providers and Payers, among others
– PHI: Personally Identifiable Health Information
 Key principles of the Privacy Rule:
– Notification: Patient should receive notice of covered entity’s privacy
practices
– Authorization and Consent: Written authorization required for disclosures not
permitted under Privacy Rule
– Limited Use and Disclosure: Covered entities must ensure use and
disclosure of minimum necessary PHI for a specific purpose
– Auditing and Accounting: Patients have the right to accounting of all
disclosures of their PHI
– Access: Patients have the right to access their records maintained by the
covered entity
Information Management
P3P and Privacy Policies
 P3P Policy: a standardized machine-readable policy format
 Includes elements that describe:
– Kinds of data collected
– Purpose for which data is used/disclosed
– Data retention policy
– … and other information
 Users can supply privacy preferences in P3P Preference Exchange
Language (APPEL), which can then be used to evaluate a P3P Privacy
Policy
Information Management
Outline
 Introduction
 Background
– HIPAA Requirements
– P3P and Privacy Policies
 Healthcare Privacy Policies Survey
 Privacy Management Architecture
 Conclusion
Information Management
Companies Surveyed
 Two kinds of
policies found:
– Website
Privacy Policy
– HIPAA Notice
of Privacy
Practices
 A “policy” in our
survey refers to a
virtual
combination of
both
Information Management
Observations on: Notification, Authorization and Consent
 Policies state that consent is implied by visiting the website
– Not quite the best practice to meet the Notification requirement
 No P3P policies are available
– Precludes automated interpretation and analysis for informed
consent
 Policy updates communicated with little regard for patient
– Insufficient to only post them on website
– Patient consent to updated policy not obtained
 Compliant with HIPAA
– HIPAA does not require policy to be posted using machine-readable
format
– HIPAA does not require policy to be communicated using expedient
means (such as email, IM)
Information Management
Observations on: Limited Use and Disclosure
 Policies define broad and all-encompassing purposes
– E.g. “administering healthcare”
– Subsumes a huge category of uses and disclosures
 No fine-grained list of employee categories or roles with authorizations to
view specific categories of patient data
– E.g. “members of medical staff” category includes most employees
– Provides umbrella authorization for employees
– Criterion for authorization or exception-based accesses (I.e. “break the glass”
privileges) not specified
 Exception mechanisms being increasingly utilized
 Compliant with HIPAA
– HIPAA has provisions to let organizations design policies with broadly-defined
purposes
 E.g: While “Marketing” is a purpose requiring explicit authorization, a sub-
category “communications for treatment of patient” is exempt and can be
exploited
– HIPAA calls for policies and procedures for controlling access to PHI but does
not require stringent technical mechanisms to be in place
Information Management
Observations on: Audit and Accounting
 Most organizations maintain audit trails for all actions pertaining to PHI to
meet audit reporting and accounting requirement
 However, there is still much left to be desired
– Audit logs in current systems do not capture all necessary contextual
information (such as purpose or recipient)
– Accounting for data disclosures is ineffective in improving levels of
privacy protection unless shortcomings in disclosure policies are first
addressed
 E.g.: broadly-defined purposes, umbrella authorizations,
exception-based accesses
– While using audit as a deterrent factor, organizations should not fail to
do better by providing more proactive protection
Information Management
Observations on: Access
 All policies indicated that patients have a right to access their information
through phone, email or online account
 Meeting this requirement does not translate into adequate privacy
protection for the patient
– Ability to access/update personal information provides no measure of
how much information is actually protected unless patient is in control
of his/her disclosure policy
– The process of information access may be simple or laborious- from
being a matter of few mouse clicks to a waiting period of up to 60
days; recent information disclosures may not get reported
Information Management
Summary
 Privacy policies cover enough ground to enable regulatory compliance
 Yet, they are inadequate to communicate understandable privacy
practices or provide adequate privacy safeguards to the patients
Information Management
Outline
 Introduction
 Background
– HIPAA Requirements
– P3P and Privacy Policies
 Healthcare Privacy Policies Survey
 Privacy Management Architecture
 Conclusion
Information Management
PRIvacy Management Architecture (PRIMA)
 Premise:
– Design of a HIPAA-inspired policy hinges primarily on limited use and
disclosure rule which enable proactive fine-grained protection of PHI
– Bridge the disparity between policies and practices to transform the
healthcare systems to an enhanced state of protection
 Approach:
– Define an incremental approach to seamlessly embed policy controls
within the clinical workflow
Information Management
Challenges
 Complexities in healthcare workflow
– A physician routinely takes notes on paper, which is then entered by a
nurse into the computer system; requiring the physician to enter
information would impede the workflow
– New patient arrival in a ward or visit to emergency ward requires
sensitive information to be provided to on-duty assistants
 Access cannot be abruptly curtailed
– New rules cannot be imposed at once
– Policy controls need to grow out of existing practices
Leads to the idea of Policy Refinement
Information Management
Policy Refinement
 Leverage audit results
– Analyze all access and disclosure instances
– Flag the incidents not explicitly covered by existing rules in policy
– Define new rules based on analyzed information
 Improve the policy coverage
– Coverage defined as ratio of accesses addressed by the policy to all
access recorded by the system
 Gradually embed policy controls
– Enables precise definition of purposes, criteria for exception-based
accesses and categories of authorized users
– Novel approach for driving innovation in clinical systems
Information Management
PRIMA Architecture
Information Management
Refinement Framework
 Prune
– Find informal clinical patterns from audit logs
– Separate useful exceptions from violations
 Reduce number of artifacts needed to be examined
 Do not waste resources on examining violations in analysis phase
 Extract
– Apply algorithm to extract candidate patterns
 Simple matching:
- Assumes pruned data, looks for term combinations, returns frequency of occurrence
 Richer data mining:
- Not only syntactic but also semantics matching
- Does not assume pruning, considers relationship between artifacts
- Reduces probability of violations being reported for analysis phase
– Get usefulness ratings of patterns
 Filter
– Incorporate or discard patterns based on usefulness threshold
– Assume a training period
 Set a threshold appropriate to the target environment
 Act when threshold is reached over a period of time
Information Management
Example Data Set
Time User Role Ward Data
Category
Excep
tion?
Purpose
t1 Tom Nurse Emergency PHY JRNL YES ADMIN
t2 Jenny Doctor Emergency EXT COLLAB YES REFERRAL
t3 Jim Nurse Emergency PHY JRNL YES ADMIN
t4 Sarah Doctor Medical LAB RESULT NO OUTPAT ENC
t5 Mark Nurse Emergency PHY JRNL YES ADMIN
t6 Bob Nurse Emergency PHY JRNL YES ADMIN
t7 Barbara Nurse Emergency PHY JRNL YES ADMIN
t8 Bill Nurse Emergency PHY JRNL YES ADMIN
t9 Patrick Radiologist Medical LAB RESULT NO OUTPAT ENC
t10 Jason Psychologist Psychology DSCG SUMM YES REG AUTH
t11 Jason Psychologist Psychology DSCG SUMM YES REG AUTH
t12 George Psychologist Psychology PHY JRNL NO REFERRAL
t13 Patrick Radiologist Medical LAB RESULT NO OUTPAT ENC
t14 Jason Psychologist Psychology DSCG SUMM YES REG AUTH
Information Management
Mining Rule
SELECT A.Ward, A.Role, A.Data_Category, A.Purpose
FROM Patient-Access_Log A
WHERE A.Exception = 'YES'
GROUP BY A.Ward, A.Role, A.Data_Category, A.Purpose
HAVING COUNT(*) > 5 AND COUNT(DISTINCT(A.User)) > 1;
Returned:
EmergencyWard : Nurse : PhysicianJournal : Admin
occurred in the log at least 5 times
observed for at least 2 different users
Not returned:
Psychologist : Psychology : DischargeSummary : Regulatoryauthority
occurred in the log only 3 times
observed for only 1 user
Information Management
Outline
 Introduction
 Background
– HIPAA Requirements
– P3P and Privacy Policies
 Healthcare Privacy Policies Survey
 Privacy Management Architecture
 Conclusion
Information Management
Conclusion
 Surveyed 20 healthcare privacy policies
 Healthcare in need of improved privacy practices
 Focused on problem of limited use and disclosure rules
 Presented novel solution based on policy refinement
Information Management
Thank you!
 Questions?

More Related Content

What's hot

Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture DCMDLearning
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
REPORT: How healthcare systems are optimizing their workforce
REPORT: How healthcare systems are optimizing their workforceREPORT: How healthcare systems are optimizing their workforce
REPORT: How healthcare systems are optimizing their workforceMichele Ertl-Rosner
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1Bryan Cline, Ph.D.
 
Hitrust csf-assurance-program-requirements-v1 3-final
Hitrust csf-assurance-program-requirements-v1 3-finalHitrust csf-assurance-program-requirements-v1 3-final
Hitrust csf-assurance-program-requirements-v1 3-finalajcob123
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingpburton60
 
Health system-evaluation-and-monitoring
Health system-evaluation-and-monitoringHealth system-evaluation-and-monitoring
Health system-evaluation-and-monitoringAhmed-Refat Refat
 
HITRUST CSF Meaningful use risk assessment
HITRUST CSF Meaningful use risk assessmentHITRUST CSF Meaningful use risk assessment
HITRUST CSF Meaningful use risk assessmentVinit Thakur
 
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd Healthcare consultant
 

What's hot (15)

178
178178
178
 
Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture D
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
How good we are in adhering HIPAA rules
How good we are in adhering HIPAA rulesHow good we are in adhering HIPAA rules
How good we are in adhering HIPAA rules
 
REPORT: How healthcare systems are optimizing their workforce
REPORT: How healthcare systems are optimizing their workforceREPORT: How healthcare systems are optimizing their workforce
REPORT: How healthcare systems are optimizing their workforce
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hitrust csf-assurance-program-requirements-v1 3-final
Hitrust csf-assurance-program-requirements-v1 3-finalHitrust csf-assurance-program-requirements-v1 3-final
Hitrust csf-assurance-program-requirements-v1 3-final
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Health system-evaluation-and-monitoring
Health system-evaluation-and-monitoringHealth system-evaluation-and-monitoring
Health system-evaluation-and-monitoring
 
HITRUST CSF Meaningful use risk assessment
HITRUST CSF Meaningful use risk assessmentHITRUST CSF Meaningful use risk assessment
HITRUST CSF Meaningful use risk assessment
 
Driving with data
Driving with dataDriving with data
Driving with data
 
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd
Healthcare Quality Improvement Advice by Dr.Mahboob ali khan Phd
 

Viewers also liked

2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary2013 State of the CIO Exec Summary
2013 State of the CIO Exec SummaryNorman Mayes
 
تكبير الذكر
تكبير الذكرتكبير الذكر
تكبير الذكرalfosoromeo
 
Paola vangogh
Paola vangoghPaola vangogh
Paola vangoghkikemmmm
 
Informační systém pro efektivní řízení vodárenství
Informační systém pro efektivní řízení vodárenstvíInformační systém pro efektivní řízení vodárenství
Informační systém pro efektivní řízení vodárenstvíIFS Czech
 
Open source nahsl
Open source nahslOpen source nahsl
Open source nahslShane Sher
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateImad Daou
 
Phree photo editing l
Phree photo editing lPhree photo editing l
Phree photo editing lShane Sher
 
프로젝트(1) 영화 세 얼간이들(3 idiots)
프로젝트(1) 영화 세 얼간이들(3 idiots)프로젝트(1) 영화 세 얼간이들(3 idiots)
프로젝트(1) 영화 세 얼간이들(3 idiots)woneunran
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Catalogo neckermann
Catalogo neckermannCatalogo neckermann
Catalogo neckermannlortegap
 
σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1ypourgeio paideias
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)pesak
 

Viewers also liked (20)

From Coding to Computational Thinking and Back
From Coding to Computational Thinking and BackFrom Coding to Computational Thinking and Back
From Coding to Computational Thinking and Back
 
2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary
 
تكبير الذكر
تكبير الذكرتكبير الذكر
تكبير الذكر
 
Paola vangogh
Paola vangoghPaola vangogh
Paola vangogh
 
Wat Is Digital Creator Eigenlijk
Wat Is Digital Creator EigenlijkWat Is Digital Creator Eigenlijk
Wat Is Digital Creator Eigenlijk
 
Libro Blanco UD2010 Docencia
Libro Blanco UD2010 DocenciaLibro Blanco UD2010 Docencia
Libro Blanco UD2010 Docencia
 
Informační systém pro efektivní řízení vodárenství
Informační systém pro efektivní řízení vodárenstvíInformační systém pro efektivní řízení vodárenství
Informační systém pro efektivní řízení vodárenství
 
VeLA: A Visual eLearning Analytics tool
VeLA: A Visual eLearning Analytics toolVeLA: A Visual eLearning Analytics tool
VeLA: A Visual eLearning Analytics tool
 
Open source nahsl
Open source nahslOpen source nahsl
Open source nahsl
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM Template
 
Phree photo editing l
Phree photo editing lPhree photo editing l
Phree photo editing l
 
프로젝트(1) 영화 세 얼간이들(3 idiots)
프로젝트(1) 영화 세 얼간이들(3 idiots)프로젝트(1) 영화 세 얼간이들(3 idiots)
프로젝트(1) 영화 세 얼간이들(3 idiots)
 
Just Words day 4
Just Words day 4Just Words day 4
Just Words day 4
 
Review of Virtual Placements
Review of Virtual PlacementsReview of Virtual Placements
Review of Virtual Placements
 
Wat Is Het Non Tekst 2010
Wat Is Het Non Tekst 2010Wat Is Het Non Tekst 2010
Wat Is Het Non Tekst 2010
 
Premios grammy
Premios grammyPremios grammy
Premios grammy
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Catalogo neckermann
Catalogo neckermannCatalogo neckermann
Catalogo neckermann
 
σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1
 
Versaille (1)
Versaille (1)Versaille (1)
Versaille (1)
 

Similar to Improving Healthcare Privacy Through Policy Refinement

Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Case Study for the Pharmaceutical Industry
Case Study for the Pharmaceutical IndustryCase Study for the Pharmaceutical Industry
Case Study for the Pharmaceutical Industrynoxam51770
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...Conference Panel
 
Information Exchange Workgroup Provider Directory Task Force 1-24-11
Information Exchange Workgroup Provider Directory Task Force 1-24-11 Information Exchange Workgroup Provider Directory Task Force 1-24-11
Information Exchange Workgroup Provider Directory Task Force 1-24-11 Brian Ahier
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewClearDATACloud
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalyticsdmcgraw418
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Samantha Haas
 
Healthcare Information Management
Healthcare Information ManagementHealthcare Information Management
Healthcare Information ManagementBijay Bhandari
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR SystemHal Amens
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurancemindleaftechnologies
 
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfEthical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfAlex860662
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Careibi
 
Top Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxTop Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxalicecarlos1
 
FDA Sentinel Initiative - From Surveillance to Research
  FDA Sentinel Initiative - From Surveillance to Research  FDA Sentinel Initiative - From Surveillance to Research
FDA Sentinel Initiative - From Surveillance to Researchdmcgraw418
 
Implementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog PostImplementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog PostJeff Brevik, PMP
 

Similar to Improving Healthcare Privacy Through Policy Refinement (20)

Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Case Study for the Pharmaceutical Industry
Case Study for the Pharmaceutical IndustryCase Study for the Pharmaceutical Industry
Case Study for the Pharmaceutical Industry
 
Hipaa basics
Hipaa basicsHipaa basics
Hipaa basics
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
 
Information Exchange Workgroup Provider Directory Task Force 1-24-11
Information Exchange Workgroup Provider Directory Task Force 1-24-11 Information Exchange Workgroup Provider Directory Task Force 1-24-11
Information Exchange Workgroup Provider Directory Task Force 1-24-11
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 
HIPAA&predictiveanalytics
HIPAA&predictiveanalyticsHIPAA&predictiveanalytics
HIPAA&predictiveanalytics
 
Hipaa privacy and security 03192014
Hipaa privacy and security 03192014Hipaa privacy and security 03192014
Hipaa privacy and security 03192014
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Healthcare Information Management
Healthcare Information ManagementHealthcare Information Management
Healthcare Information Management
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdfEthical Considerations for Healthcare Analytics Data Disposal.pdf
Ethical Considerations for Healthcare Analytics Data Disposal.pdf
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Care
 
Top Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxTop Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptx
 
FDA Sentinel Initiative - From Surveillance to Research
  FDA Sentinel Initiative - From Surveillance to Research  FDA Sentinel Initiative - From Surveillance to Research
FDA Sentinel Initiative - From Surveillance to Research
 
Implementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog PostImplementing EHR in Behavioral Health Blog Post
Implementing EHR in Behavioral Health Blog Post
 

More from Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 
Publishing in Biomedical Data Science
Publishing in Biomedical Data SciencePublishing in Biomedical Data Science
Publishing in Biomedical Data ScienceTyrone Grandison
 

More from Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 
Publishing in Biomedical Data Science
Publishing in Biomedical Data SciencePublishing in Biomedical Data Science
Publishing in Biomedical Data Science
 

Recently uploaded

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Recently uploaded (20)

Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Improving Healthcare Privacy Through Policy Refinement

  • 1. 2006 Intelligent Information Systems From Lip-Service to Action: Improving Healthcare Privacy Practices Tyrone Grandison & Rafae Bhatti IBM Almaden Research Center {rbhatti,tyroneg}@us.ibm.com
  • 2. Information Management Outline  Introduction  Background – HIPAA Requirements – P3P and Privacy Policies  Healthcare Privacy Policies Survey  Privacy Management Architecture  Conclusion
  • 3. Information Management Introduction  Privacy concerns main inhibitors to use and deployment of electronic health records – Concerns about loss of reputation resulting from privacy breaches translating into increased spending on healthcare privacy compliance – In US, HIPAA is assumed to provide baseline for healthcare privacy protection  However, impact of adoption of privacy policies on improvement of privacy practices remains to be ascertained – The answer lies in the design and enforceability of policy
  • 4. Information Management Highlight of Issues  Policy Design – Policy designed to cover relevant provisions of regulation but still vague enough to offer little privacy protection  Broadly-defined purposes  Umbrella authorizations  Lax enforcement – Policy is often bypassed or subverted during regular operation Concerns have begun to emerge at national level – Robert Pear. Warnings over Privacy of US Health Network. New York Times, February 18, 2007.
  • 5. Information Management Why does this situation need improvement?  It puts you, the patient, at risk – Results in false sense of privacy  Purported compliance with privacy regulations – Undermines the notion of empowering the patient  Consent to a policy not a genuine reflection of privacy practices  It makes the existence of a policy insignificant – A policy does not reveal a company’s true stance on data protection
  • 6. Information Management Our Contributions  Survey of HIPAA-inspired policies of 20 healthcare organizations – Investigate how stated privacy policies measure up to the level of protection needed to truly ensure patient data  PRIvacy Management Architecture (PRIMA) – Enables refinement of privacy policies based on actual practices of an organization
  • 7. Information Management Goals of Policy Refinement  Improve the design of policies to elevate the level of privacy protection afforded to the patient  Elevate current system from one that purports regulatory compliance to one that proactively safeguards patient healthcare data  Better align the policies with actual privacy practices of the organization
  • 8. Information Management Outline  Introduction  Background – HIPAA Requirements – P3P and Privacy Policies  Healthcare Privacy Policies Survey  Privacy Management Architecture  Conclusion
  • 9. Information Management The Privacy Space Around the World  Canada: Personal Information Protection and Electronic Documents Act (PIPEDA)  Japan: Personal Data Protection Law  EU Directives on Data Protection  US: HIPAA To ground our discussion, we focus on HIPAA Privacy Rule
  • 10. Information Management HIPAA Requirements  Terms: – Covered Entities: Health Care Providers and Payers, among others – PHI: Personally Identifiable Health Information  Key principles of the Privacy Rule: – Notification: Patient should receive notice of covered entity’s privacy practices – Authorization and Consent: Written authorization required for disclosures not permitted under Privacy Rule – Limited Use and Disclosure: Covered entities must ensure use and disclosure of minimum necessary PHI for a specific purpose – Auditing and Accounting: Patients have the right to accounting of all disclosures of their PHI – Access: Patients have the right to access their records maintained by the covered entity
  • 11. Information Management P3P and Privacy Policies  P3P Policy: a standardized machine-readable policy format  Includes elements that describe: – Kinds of data collected – Purpose for which data is used/disclosed – Data retention policy – … and other information  Users can supply privacy preferences in P3P Preference Exchange Language (APPEL), which can then be used to evaluate a P3P Privacy Policy
  • 12. Information Management Outline  Introduction  Background – HIPAA Requirements – P3P and Privacy Policies  Healthcare Privacy Policies Survey  Privacy Management Architecture  Conclusion
  • 13. Information Management Companies Surveyed  Two kinds of policies found: – Website Privacy Policy – HIPAA Notice of Privacy Practices  A “policy” in our survey refers to a virtual combination of both
  • 14. Information Management Observations on: Notification, Authorization and Consent  Policies state that consent is implied by visiting the website – Not quite the best practice to meet the Notification requirement  No P3P policies are available – Precludes automated interpretation and analysis for informed consent  Policy updates communicated with little regard for patient – Insufficient to only post them on website – Patient consent to updated policy not obtained  Compliant with HIPAA – HIPAA does not require policy to be posted using machine-readable format – HIPAA does not require policy to be communicated using expedient means (such as email, IM)
  • 15. Information Management Observations on: Limited Use and Disclosure  Policies define broad and all-encompassing purposes – E.g. “administering healthcare” – Subsumes a huge category of uses and disclosures  No fine-grained list of employee categories or roles with authorizations to view specific categories of patient data – E.g. “members of medical staff” category includes most employees – Provides umbrella authorization for employees – Criterion for authorization or exception-based accesses (I.e. “break the glass” privileges) not specified  Exception mechanisms being increasingly utilized  Compliant with HIPAA – HIPAA has provisions to let organizations design policies with broadly-defined purposes  E.g: While “Marketing” is a purpose requiring explicit authorization, a sub- category “communications for treatment of patient” is exempt and can be exploited – HIPAA calls for policies and procedures for controlling access to PHI but does not require stringent technical mechanisms to be in place
  • 16. Information Management Observations on: Audit and Accounting  Most organizations maintain audit trails for all actions pertaining to PHI to meet audit reporting and accounting requirement  However, there is still much left to be desired – Audit logs in current systems do not capture all necessary contextual information (such as purpose or recipient) – Accounting for data disclosures is ineffective in improving levels of privacy protection unless shortcomings in disclosure policies are first addressed  E.g.: broadly-defined purposes, umbrella authorizations, exception-based accesses – While using audit as a deterrent factor, organizations should not fail to do better by providing more proactive protection
  • 17. Information Management Observations on: Access  All policies indicated that patients have a right to access their information through phone, email or online account  Meeting this requirement does not translate into adequate privacy protection for the patient – Ability to access/update personal information provides no measure of how much information is actually protected unless patient is in control of his/her disclosure policy – The process of information access may be simple or laborious- from being a matter of few mouse clicks to a waiting period of up to 60 days; recent information disclosures may not get reported
  • 18. Information Management Summary  Privacy policies cover enough ground to enable regulatory compliance  Yet, they are inadequate to communicate understandable privacy practices or provide adequate privacy safeguards to the patients
  • 19. Information Management Outline  Introduction  Background – HIPAA Requirements – P3P and Privacy Policies  Healthcare Privacy Policies Survey  Privacy Management Architecture  Conclusion
  • 20. Information Management PRIvacy Management Architecture (PRIMA)  Premise: – Design of a HIPAA-inspired policy hinges primarily on limited use and disclosure rule which enable proactive fine-grained protection of PHI – Bridge the disparity between policies and practices to transform the healthcare systems to an enhanced state of protection  Approach: – Define an incremental approach to seamlessly embed policy controls within the clinical workflow
  • 21. Information Management Challenges  Complexities in healthcare workflow – A physician routinely takes notes on paper, which is then entered by a nurse into the computer system; requiring the physician to enter information would impede the workflow – New patient arrival in a ward or visit to emergency ward requires sensitive information to be provided to on-duty assistants  Access cannot be abruptly curtailed – New rules cannot be imposed at once – Policy controls need to grow out of existing practices Leads to the idea of Policy Refinement
  • 22. Information Management Policy Refinement  Leverage audit results – Analyze all access and disclosure instances – Flag the incidents not explicitly covered by existing rules in policy – Define new rules based on analyzed information  Improve the policy coverage – Coverage defined as ratio of accesses addressed by the policy to all access recorded by the system  Gradually embed policy controls – Enables precise definition of purposes, criteria for exception-based accesses and categories of authorized users – Novel approach for driving innovation in clinical systems
  • 24. Information Management Refinement Framework  Prune – Find informal clinical patterns from audit logs – Separate useful exceptions from violations  Reduce number of artifacts needed to be examined  Do not waste resources on examining violations in analysis phase  Extract – Apply algorithm to extract candidate patterns  Simple matching: - Assumes pruned data, looks for term combinations, returns frequency of occurrence  Richer data mining: - Not only syntactic but also semantics matching - Does not assume pruning, considers relationship between artifacts - Reduces probability of violations being reported for analysis phase – Get usefulness ratings of patterns  Filter – Incorporate or discard patterns based on usefulness threshold – Assume a training period  Set a threshold appropriate to the target environment  Act when threshold is reached over a period of time
  • 25. Information Management Example Data Set Time User Role Ward Data Category Excep tion? Purpose t1 Tom Nurse Emergency PHY JRNL YES ADMIN t2 Jenny Doctor Emergency EXT COLLAB YES REFERRAL t3 Jim Nurse Emergency PHY JRNL YES ADMIN t4 Sarah Doctor Medical LAB RESULT NO OUTPAT ENC t5 Mark Nurse Emergency PHY JRNL YES ADMIN t6 Bob Nurse Emergency PHY JRNL YES ADMIN t7 Barbara Nurse Emergency PHY JRNL YES ADMIN t8 Bill Nurse Emergency PHY JRNL YES ADMIN t9 Patrick Radiologist Medical LAB RESULT NO OUTPAT ENC t10 Jason Psychologist Psychology DSCG SUMM YES REG AUTH t11 Jason Psychologist Psychology DSCG SUMM YES REG AUTH t12 George Psychologist Psychology PHY JRNL NO REFERRAL t13 Patrick Radiologist Medical LAB RESULT NO OUTPAT ENC t14 Jason Psychologist Psychology DSCG SUMM YES REG AUTH
  • 26. Information Management Mining Rule SELECT A.Ward, A.Role, A.Data_Category, A.Purpose FROM Patient-Access_Log A WHERE A.Exception = 'YES' GROUP BY A.Ward, A.Role, A.Data_Category, A.Purpose HAVING COUNT(*) > 5 AND COUNT(DISTINCT(A.User)) > 1; Returned: EmergencyWard : Nurse : PhysicianJournal : Admin occurred in the log at least 5 times observed for at least 2 different users Not returned: Psychologist : Psychology : DischargeSummary : Regulatoryauthority occurred in the log only 3 times observed for only 1 user
  • 27. Information Management Outline  Introduction  Background – HIPAA Requirements – P3P and Privacy Policies  Healthcare Privacy Policies Survey  Privacy Management Architecture  Conclusion
  • 28. Information Management Conclusion  Surveyed 20 healthcare privacy policies  Healthcare in need of improved privacy practices  Focused on problem of limited use and disclosure rules  Presented novel solution based on policy refinement