SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Presenter: Tyrone W A Grandison. 12 October 2010




      Patient-Centric Privacy
   Envisioning Collaboration Between Payers,
  Providers & Patients With The Patient At The
                      Core


                             6th International Conference on Collaborative
                               Computing: Networking, Applications and
                                              Worksharing
Goal
    To highlight a latent (and often ignored) concern
    To demonstrate how it affects each of us
    To articulate a vision
    To convince you to help in:
     –The creation of new theories and implementations
     –The re-shaping of the healthcare industry




2                    - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Motivation
      Protecting Personal Health Information (PHI) continues to be a hindrance to the
      acceptance, adoption and continued use of Healthcare Information Technology
      (HIT).
      Current solutions proscribe to an unstated assumption
      – Data Stewardship* is equated to Data Ownership*.
      – This notion has two profound consequences:
         1. Relegates the patient to the role of information provider
         2. Empowers infrastructure owners with data ownership rights.
      To correct this, we have to:
      – Understand how we got here
      – Understand what changes need to be done
      – Promote and Create solutions that are fair and equitable
         • Enable healthcare payers, healthcare providers and providers to be
            equally empowered
         • Enable a collaboration where benefits and risks are understood and
            equally shared.
    * A data steward (“steward”) is an entity who receives a client’s data, in the operation and execution of their (business)
      function, with the expectation that they will be a trustworthy agent or proxy on behalf of the client, while a data owner
      (“owner”) is an entity that provides data or has information generated about them in the process of using a service.

3                                    - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Current Truths About the Healthcare Business


1. Businesses are in control of healthcare industry1.
       – Obvious, but requires stating
       – Implies that there are market forces that necessitate that there are
         compelling economic motivations for the core processes, technologies and
         services offered by healthcare companies.

2. Healthcare payers and providers view patient data they receive as
   their own assets2.
       – “When I was practicing as a physician, I considered those records to be my
         property”2
       – Whether a conscious market decision or execution of established best
         practice, a common domain assumption is that data from patients or the
         information that is generated from processing patient data is a part of the
         healthcare entity’s portfolio.

1. James Gubb, Oliver Meller-Herbert. “Markets in Health care - The theory behind the policy”. CIVITAS: Institute for the
   Study of Civil Society Report. Dec 2009. http://www.civitas.org.uk/nhs/download/Civitas_Markets_in_healthcare_Dec09.pdf
2. Tim O'Reilly. “A Manifesto on Health Data Rights”. O'Reilly Radar. June 22, 2009.
   http://radar.oreilly.com/2009/06/manifesto-health-data-rights.html



4                                 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Current Truths (contd.)

    When the previous two assumptions are combined, a specific
    business model is produced where:
     –A trusted steward claims ownership over the data it collects.
     –The stewards provide access to this data to a client base for
      profit.
     –The data users in this client base include:
       • patients, who normally pay for these services to be performed,
       • agents that cover the cost of the services.
       • third party affiliates or business associates that are willing to pay
         for data in order to deliver their own products and services.
       • researchers who are investigating an area that is of interest to the
         healthcare entity.
    Unfortunately, this business model is not optimized to deliver
    either maximum benefit to the patient (who is the entity with
    the most at risk in this system) or to attain an equilibrium
    point where risk and reward is spread equally amongst all
    involved.
5                     - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
The Reason For Concern




6      - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
How Did We Get Here?
    Shift in Medicine from General Practice to Specialization1,2
     –one-on-one to one-to-many
    With specialization, i.e. a multi-tier, multiple-interaction,
    multiple-practitioner model of care delivery, a financial
    structure evolved in order to facilitate healthcare payments3.
     –i.e. health insurance companies, health maintenance
       organizations, etc.
    Currently, Chasm between Patient Expectation and Current
    Practice4.
1. Gerald Higgins. “The History of Confidentiality in Medicine: The Physician-Patient Relationship”. Canadian Family Physician 35
   (April 1989): 921-926.
2. Mark Siegler. “Confidentiality in Medicine – A Decrepit Concept”. New England Journal of Medicine 307, no. 24 (1982): 1518-1521.
3. Terree P Wasley. “Health care in the twentieth century: a history of government interference and protection”. Moneywatch.com,
   April 1993. http://findarticles.com/p/articles/mi_m1094/is_n2_v28/ai_13834930/
4. Tyrone Grandison, Rafae Bhatti. “HIPAA Compliance and Patient Privacy Protection”. The proceedings of the 13th World Congress on
   Medical and Health Informatics (MEDINFO). September 12-15, 2010. Cape Town, South Africa.


7                                  - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Patient-Centric Privacy

    Patient-Centric Privacy refers to:
     –The recognition that patients are a fundamental1 and
      integral2 part of the disclosure, access and use processes,
      and
     –The ability of the patient to control the release of their
      healthcare information
    The core assumption – data stewardship does not equate to
    data ownership
    By patient-centric, I am not referring to prior views that state
    that it is about manipulating artifacts at the patient-level, i.e.
    record-level or tuple-level controls.
    1. fundamental - patients are the basic, foundational and essential building blocks of the system
    2. integral - patients (and their input) are necessary to the completeness and usefulness of the system.


8                               - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Related Work
    Privacy By Design
     – Foundational Principles are: 1) Proactive not Reactive, 2) Privacy as the Default, 3)
       Privacy Embedded into the Design, 4) Full-functionality - Positive Sum, not Zero-Sum, 5)
       End-to-End Lifecycle Protection, 6) Visibility and Transparency, and 7) Respect for User
       Privacy.

    SHARP Grants
     – In April of 2010, the Office of the National Coordinator for Health Information Technology
       (ONCHIT) in the US Department of Health and Human Services (HHS) awarded $60
       million in grants under the Strategic Health IT Advanced Research Projects (SHARP)
       Program in four topic areas
     – Two of the areas are 1) Security and Health Information Technology & 2) Health care
       Application and Network Design.
     – Both areas seek to develop new technologies while ensuring and improving privacy and
       security. Both are just beginning.

    Privacy and Security Tiger Team (PSTT) – HHS HIT Policy Committee
     – On August 19th, 2010, the PSTT recommended the adoption of guidelines set out in the
       Fair Information Practices (FIP).
     – They state that "this overarching set of principles, when taken together, constitute good
       data stewardship and form a foundation of public trust in the collection, access, use, and
       disclosure of personal information“
     – At the highest level, they assume that control is in the hands of the provider and they
       articulate initial proposals for facilitating patient consent.
9                           - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
The Current Operational Model




10        - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Highlights of the Current Model
     The process of delivering care:
      – patients give a healthcare entity all the information required by the medical practitioners
        to perform their job.
      – patients provide a valuable asset (i.e. data) to healthcare entities and also pay for the
        service that they are accessing.
     Healthcare entities maximize their profit by:
      1. entering into revenue sharing agreements, based on patient data, with associates and
         third parties,
      2. selling patient data to information brokers, who may re-package, collate and aggregate
         data to offer value-added services to optimize other businesses, and
      3. utilizing the services of partners to make patient data more valuable.
     Healthcare entities assumes control of the ingested data and the patient is assumed to
     have no control over the use of her data.
      – Additionally, patient receives none of the revenue generated from the use of her data.
     It is argued that some of the profit-boosting activities of the healthcare entities subsidize the
     cost of care to the patient
      – This behavior may only translate into a cost reduction for the patient and never a
           (personal) revenue increase; as is the case for the business.
     The downsides of this model
      – The patient assumes a significantly higher proportion of the risk without gaining the
        (considerable) revenue upside that the healthcare entity enjoys.
      – The provider/payer is often incentivized to take significant risk; so long as the reward to
        the organization exceeds the expenditure needed to stem or repair any reputational
        damage and or trust erosion that may be incurred.
11                           - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
How Does One Get To a Patient-Centric System?

     What are the influencing/confounding factors/dimensions to collaboration?
      –Financial Incentive
        • Requires that the ROI,EL Valuation and the LP be calculated.
            * mathematical models can be created for each of these variables based on private
              revenue data and publicly-available data from national (and international)
              organizations, e.g. National Health Care Anti-Fraud Association (NHCAA), HHS’
              Office of Civil Rights (OCR).
         • The incentive model would help payers (and providers) see the
           case for porting their systems
            * increased patient participation offer them a meaningful reward should translate
              into (rationalized) orders of magnitude more benefit to the payer.
      –Collective Willpower
        • A collective of focused, aware people working towards the goal.
      –Patient Knowledge
        • There is a low percentage of patients who are
            1. aware of their rights with respect to their healthcare data and
            2. know what healthcare payers and providers do with their data
         • Education will either reassure patients or spur them into action
12                         - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
What About the Technology Element?
     For immediate applicability in the American context
      – Leverage the Nationwide Health Information Network (NHIN)* effort, which is currently
         supported by the Office of the National Coordinator for Health Information Technology
         (ONC).
           • This work defines a collection of standards, protocols, legal agreements,
             specifications, and services that enable secure Health Information Exchange (HIE).
     Assumes
      – A Healthcare (Service) Bus, which securely transports healthcare messages throughout
        the network.
      – Common Core HIE Services, such as a Translation service, a Patient Identity Cross
        Referencing Service, conversion services, etc
     Introduces
       – A Financial Transaction Service
           • Triggered whenever an incoming request triggers a positive consent decision, and
             supervises the transfer of funds from utilized data and issues payments to the
             involved parties.
       – A Consent Server
* The NHIN standards, services and policies are being developed by the NHIN Cooperative - a group of federal agencies, local,
  regional and state-level Health Information Exchange Organizations (HIOs) and integrated delivery networks. Initial
  recommendations have recently spurred work on a new initiative NHIN Direct.
  http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_gov__nationwide_health_information_network/1142

13                                - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Patient-centric Privacy-enabled Healthcare Model
                for Current Systems




14            - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Technically Fostering Patient Involvement
 PERMISSIONS
      ( patient_ref_no char(18),
                                                         Patient with patient_ref_no has decided to grant consent
          consent_decision Boolean,                      (consent_decision = 1) or not (consent_decision = 0) for her
          data_segment char(18),                             data of type data_segment to be used for purpose
                                                            for_purpose by professional granted_person with the
          for_purpose char(18),                         understanding that negotiated_remuneration will be paid and
          granted_person char(32),                             further conditions further_constraints are met.
          delegated_person char(32),                •Note that either granted_person or delegated_person must be blank.
          negotiated_remuneration int,              •If delegated_person is specified, then this becomes a statement of the
                                                    delegation of this consent to delegated_person.
          further_constraints char(32)
      )
  CONSENT is a technical mechanism to enable individual choice. Exact mechanism
 unimportant
     UTMOST IMPORTANCE – GOAL
        –A new healthcare model where control of every facet of a patient’s data remains under
        her control during the entire information lifecycle.
        –Technically, access control mechanisms with native support for (advanced) consent
        (and delegation) management are the bedrock.
        –Also all systems set to enable the maximum level of privacy by default and patients
        must opt-in for data use (if the patient finds the associated remuneration acceptable).
15                                 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
What If This is Being Done From Scratch?
     Inherent assumptions would be:
       – Healthcare entities focus on delivering better service and that this is the only driver for
         their continued revenue success
       – Patients maintain ownership of and have contractual rights over their data.
     Conceptually:
      – After the patient pays for a service and provides her data to a healthcare entity, the
        entity publishes an anonymized synopsis of the patient data with a reference to the
        patient (or the patient’s account information).
          • Anonymization offers an added layer of security for identity protection. This entire
            process may be viewed as being similar to that of HIE registration.
      – Interested parties may query the Information Publication/Discovery resource and request
        to use the specific patient data that is relevant to them.
          • Use of this data requires consent from the data owner (i.e. the patient) and payment
            for using this data (i.e. sent to the patient’s account), which would be handled
            through a trusted Financial Transaction service.
     It should be noted that securing patient account information must be addressed before this
     model is deployed.
        – In lieu of having links back to the patient information, one could use previously stored
          consent management information, along with more creative reimbursement schemes, to
          achieve the same goal.


16                             - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Patient-Centric Model: From Scratch




17           - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Initial Set of Hard Questions
     What is the motivation to include the patient in the loop?
      – The prevailing business model will persist as long as the public remains unaware of their lack of
        control and the inherent risk they face.
      – As previously hinted at, increased patient awareness, more transparency into healthcare business
        practices and an increasing number of healthcare data breaches will facilitate a need for change.
      – Adoption will also be accelerated by work on new fair ROI models for EHRs.
     Do we have all the components to make this a reality?
      – Components fall into four categories: business, technology, legislative and societal (BLTS).
      – Some business and technical components introduced here.
          • Up to YOU to define the technology components more fully.
      – The legislative and societal components involve:
          • policy advocacy to strengthen laws and regulations with regards to patients’ interests and
          • consumer education on their rights, current healthcare best practices and their role.
     Will the transition & maintenance costs be prohibitive?
      – Federal funding from the American Recovery Act of 2009 will provide fuel for the initial stages of HIT
        development (if core patient-centric privacy principles were included at design time).
      – The transition and maintenance costs for initiatives can hopefully be negligibly factored into the
        overall system cost.
     How is this going to happen? Who should lead it?
      – The likely agents of change should be the Federal government – who are the representatives of the
        people and the group who can effectively interface with all the stakeholders.
      – This effort requires a concerted collaboration between all the stakeholders in the healthcare system to
        be effective.

18                              - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Conclusion
     As Healthcare is being transformed, it is an appropriate time
     to evaluate and implement models that ensure the long-term
     success of the industry going forward.
     The intention of this paper is to spur discussion and debate
     on this issue.
     The equating of data stewardship rights with data ownership
     rights by healthcare payers and providers have left the
     patient out of the loop.
     Correcting this issue requires a coordinated collaboration of
     healthcare stakeholders.
     Hopefully, this represents a starting point.
19                    - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing

Contenu connexe

Tendances

Ethics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesEthics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesZakCooper1
 
White Paper HDI_big data and prevention_EN_Nov2016
White Paper HDI_big data and prevention_EN_Nov2016White Paper HDI_big data and prevention_EN_Nov2016
White Paper HDI_big data and prevention_EN_Nov2016Anne Gimalac
 
Power point project for submission ppt (2)
Power point project for submission ppt (2)Power point project for submission ppt (2)
Power point project for submission ppt (2)mshaner
 
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018Julien VENNE
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?M2SYS Technology
 
Health literacy in India
Health literacy in IndiaHealth literacy in India
Health literacy in Indiamaitrayee_ghosh
 
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...ijtsrd
 
Power point project for submission.ppt
Power point project for submission.pptPower point project for submission.ppt
Power point project for submission.pptMEBYER4954
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007Richard Moore
 

Tendances (19)

Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Ethics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesEthics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slides
 
Health data - Is it safe?
Health data - Is it safe?Health data - Is it safe?
Health data - Is it safe?
 
White Paper HDI_big data and prevention_EN_Nov2016
White Paper HDI_big data and prevention_EN_Nov2016White Paper HDI_big data and prevention_EN_Nov2016
White Paper HDI_big data and prevention_EN_Nov2016
 
Power point project for submission ppt (2)
Power point project for submission ppt (2)Power point project for submission ppt (2)
Power point project for submission ppt (2)
 
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
 
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018
The Digital Health Society (by Julien Venne) @ICT2018 Vienna 6th Dec 2018
 
Collaborative Healthcare Models
Collaborative Healthcare ModelsCollaborative Healthcare Models
Collaborative Healthcare Models
 
Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?Big Data in Healthcare -- What Does it Mean?
Big Data in Healthcare -- What Does it Mean?
 
Health literacy in India
Health literacy in IndiaHealth literacy in India
Health literacy in India
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2
 
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...
An Adaptive Technique in Electronic Health Record for Clinical Decision Makin...
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
Totally
TotallyTotally
Totally
 
Power point project for submission.ppt
Power point project for submission.pptPower point project for submission.ppt
Power point project for submission.ppt
 
Perfect font
Perfect fontPerfect font
Perfect font
 
Health IT Beyond Hospitals
Health IT Beyond HospitalsHealth IT Beyond Hospitals
Health IT Beyond Hospitals
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 

En vedette

The Use of Digital Technologies for Language Revitalization
The Use of Digital Technologies for Language RevitalizationThe Use of Digital Technologies for Language Revitalization
The Use of Digital Technologies for Language RevitalizationGrial - University of Salamanca
 
2009 07 flying high presentation revised
2009 07 flying high presentation revised2009 07 flying high presentation revised
2009 07 flying high presentation revisedGTAPA
 
Evaluation and observations of virtual placements already star ted & Virtua...
Evaluation and observations of virtual placements already star ted & Virtua...Evaluation and observations of virtual placements already star ted & Virtua...
Evaluation and observations of virtual placements already star ted & Virtua...Grial - University of Salamanca
 
IFS World - speciál IFS Aplikace 8
IFS World - speciál IFS Aplikace 8IFS World - speciál IFS Aplikace 8
IFS World - speciál IFS Aplikace 8IFS Czech
 
Finding Images using Google Images
Finding Images using Google ImagesFinding Images using Google Images
Finding Images using Google ImagesJulie Anne Kent
 
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)IFS Czech
 
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...Pensá global. La Dirección General de Comercio Exterior para Emprender de for...
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...Gastón Marando
 
Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateImad Daou
 
Brand Manual
Brand ManualBrand Manual
Brand Manualakulsingh
 
Lost in the Weeds: Grassroots Media Grows Up
Lost in the Weeds: Grassroots Media Grows UpLost in the Weeds: Grassroots Media Grows Up
Lost in the Weeds: Grassroots Media Grows UpChristopher Spencer
 
Cobo Coscotin Vasilica documentatie
Cobo Coscotin Vasilica documentatieCobo Coscotin Vasilica documentatie
Cobo Coscotin Vasilica documentatiecoscotin
 
Network Media - A Final Lecture
Network Media - A Final LectureNetwork Media - A Final Lecture
Network Media - A Final Lecturevogmae
 
σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1ypourgeio paideias
 
Affective Assemblage: Documentary Practice
Affective Assemblage: Documentary PracticeAffective Assemblage: Documentary Practice
Affective Assemblage: Documentary Practicevogmae
 
Ostrava
OstravaOstrava
Ostravapesak
 

En vedette (20)

Downloaddebat
DownloaddebatDownloaddebat
Downloaddebat
 
The Use of Digital Technologies for Language Revitalization
The Use of Digital Technologies for Language RevitalizationThe Use of Digital Technologies for Language Revitalization
The Use of Digital Technologies for Language Revitalization
 
2009 07 flying high presentation revised
2009 07 flying high presentation revised2009 07 flying high presentation revised
2009 07 flying high presentation revised
 
Droits taxes-produits-energie-juillet 2011 dgddi
Droits taxes-produits-energie-juillet 2011 dgddiDroits taxes-produits-energie-juillet 2011 dgddi
Droits taxes-produits-energie-juillet 2011 dgddi
 
IERS Newsletter 3
IERS Newsletter 3IERS Newsletter 3
IERS Newsletter 3
 
Libro Blanco UD2010 Docencia
Libro Blanco UD2010 DocenciaLibro Blanco UD2010 Docencia
Libro Blanco UD2010 Docencia
 
Evaluation and observations of virtual placements already star ted & Virtua...
Evaluation and observations of virtual placements already star ted & Virtua...Evaluation and observations of virtual placements already star ted & Virtua...
Evaluation and observations of virtual placements already star ted & Virtua...
 
IFS World - speciál IFS Aplikace 8
IFS World - speciál IFS Aplikace 8IFS World - speciál IFS Aplikace 8
IFS World - speciál IFS Aplikace 8
 
Finding Images using Google Images
Finding Images using Google ImagesFinding Images using Google Images
Finding Images using Google Images
 
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)mobility.ifsworld.com - Mobilita dorazila až na hranice ERP  (2)
mobility.ifsworld.com - Mobilita dorazila až na hranice ERP (2)
 
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...Pensá global. La Dirección General de Comercio Exterior para Emprender de for...
Pensá global. La Dirección General de Comercio Exterior para Emprender de for...
 
Book1
Book1Book1
Book1
 
Course 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM TemplateCourse 1: Create and Prepare CentOS 7 VM Template
Course 1: Create and Prepare CentOS 7 VM Template
 
Brand Manual
Brand ManualBrand Manual
Brand Manual
 
Lost in the Weeds: Grassroots Media Grows Up
Lost in the Weeds: Grassroots Media Grows UpLost in the Weeds: Grassroots Media Grows Up
Lost in the Weeds: Grassroots Media Grows Up
 
Cobo Coscotin Vasilica documentatie
Cobo Coscotin Vasilica documentatieCobo Coscotin Vasilica documentatie
Cobo Coscotin Vasilica documentatie
 
Network Media - A Final Lecture
Network Media - A Final LectureNetwork Media - A Final Lecture
Network Media - A Final Lecture
 
σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1σελιδοδείκτες καλή σχολικήχρονιά 1
σελιδοδείκτες καλή σχολικήχρονιά 1
 
Affective Assemblage: Documentary Practice
Affective Assemblage: Documentary PracticeAffective Assemblage: Documentary Practice
Affective Assemblage: Documentary Practice
 
Ostrava
OstravaOstrava
Ostrava
 

Similaire à Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers & Patients With The Patient At The Core

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformationElizabeth Koumpan
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting ipposi
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsMohammad Al-Ubaydli
 
Analytics_Wealth of Infomation
Analytics_Wealth of InfomationAnalytics_Wealth of Infomation
Analytics_Wealth of InfomationHeather Fraser
 
1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdfADARSHMANISH
 
1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdfamir421526
 
Catalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncareCatalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncare~Eric Principe
 
Data Mining in Health Care
Data Mining in Health CareData Mining in Health Care
Data Mining in Health CareShahDhruv21
 
Registries for Medical Devices in Europe Reflection Paper_January 2016
Registries for Medical Devices in Europe Reflection Paper_January 2016Registries for Medical Devices in Europe Reflection Paper_January 2016
Registries for Medical Devices in Europe Reflection Paper_January 2016Sebastian Gaiser
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Healthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityHealthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityDinesh V
 
DoctorsHello Medical Ecosystem
DoctorsHello Medical Ecosystem DoctorsHello Medical Ecosystem
DoctorsHello Medical Ecosystem Doctors Hello
 
Internet marketing mark 468 health group - final
Internet marketing mark 468  health group - finalInternet marketing mark 468  health group - final
Internet marketing mark 468 health group - finalJamesonCase
 
Towards Building a Person-Centred and Provider-Friendly Health System
Towards Building a Person-Centred and Provider-Friendly Health SystemTowards Building a Person-Centred and Provider-Friendly Health System
Towards Building a Person-Centred and Provider-Friendly Health SystemHealth Informatics New Zealand
 

Similaire à Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers & Patients With The Patient At The Core (20)

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformation
 
Health Data Sharing Scene Setting
Health Data Sharing Scene Setting Health Data Sharing Scene Setting
Health Data Sharing Scene Setting
 
Review of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-OutsReview of Data Security, Consent and Opt-Outs
Review of Data Security, Consent and Opt-Outs
 
Analytics_Wealth of Infomation
Analytics_Wealth of InfomationAnalytics_Wealth of Infomation
Analytics_Wealth of Infomation
 
1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf
 
1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf1 The upper level of the informatics stack Focuses on in.pdf
1 The upper level of the informatics stack Focuses on in.pdf
 
Catalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncareCatalyzing coordinationtechnologyswholepersoncare
Catalyzing coordinationtechnologyswholepersoncare
 
Data Mining in Health Care
Data Mining in Health CareData Mining in Health Care
Data Mining in Health Care
 
Διαχείριση Ανοικτών Ερευνητικών Δεδομένων Υγείας - Π. Μπαμίδης
Διαχείριση Ανοικτών Ερευνητικών Δεδομένων Υγείας - Π. ΜπαμίδηςΔιαχείριση Ανοικτών Ερευνητικών Δεδομένων Υγείας - Π. Μπαμίδης
Διαχείριση Ανοικτών Ερευνητικών Δεδομένων Υγείας - Π. Μπαμίδης
 
Registries for Medical Devices in Europe Reflection Paper_January 2016
Registries for Medical Devices in Europe Reflection Paper_January 2016Registries for Medical Devices in Europe Reflection Paper_January 2016
Registries for Medical Devices in Europe Reflection Paper_January 2016
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Healthcare evolves with Data Interoperability
Healthcare evolves with Data InteroperabilityHealthcare evolves with Data Interoperability
Healthcare evolves with Data Interoperability
 
DoctorsHello Medical Ecosystem
DoctorsHello Medical Ecosystem DoctorsHello Medical Ecosystem
DoctorsHello Medical Ecosystem
 
Internet marketing mark 468 health group - final
Internet marketing mark 468  health group - finalInternet marketing mark 468  health group - final
Internet marketing mark 468 health group - final
 
U.S. Medical Grid
U.S. Medical GridU.S. Medical Grid
U.S. Medical Grid
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Towards Building a Person-Centred and Provider-Friendly Health System
Towards Building a Person-Centred and Provider-Friendly Health SystemTowards Building a Person-Centred and Provider-Friendly Health System
Towards Building a Person-Centred and Provider-Friendly Health System
 
How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"
 
Healthcare predictions 2018
Healthcare predictions 2018Healthcare predictions 2018
Healthcare predictions 2018
 

Plus de Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 

Plus de Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Patient-Centric Privacy: Envisioning Collaboration Between Payers, Providers & Patients With The Patient At The Core

  • 1. Presenter: Tyrone W A Grandison. 12 October 2010 Patient-Centric Privacy Envisioning Collaboration Between Payers, Providers & Patients With The Patient At The Core 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 2. Goal To highlight a latent (and often ignored) concern To demonstrate how it affects each of us To articulate a vision To convince you to help in: –The creation of new theories and implementations –The re-shaping of the healthcare industry 2 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 3. Motivation Protecting Personal Health Information (PHI) continues to be a hindrance to the acceptance, adoption and continued use of Healthcare Information Technology (HIT). Current solutions proscribe to an unstated assumption – Data Stewardship* is equated to Data Ownership*. – This notion has two profound consequences: 1. Relegates the patient to the role of information provider 2. Empowers infrastructure owners with data ownership rights. To correct this, we have to: – Understand how we got here – Understand what changes need to be done – Promote and Create solutions that are fair and equitable • Enable healthcare payers, healthcare providers and providers to be equally empowered • Enable a collaboration where benefits and risks are understood and equally shared. * A data steward (“steward”) is an entity who receives a client’s data, in the operation and execution of their (business) function, with the expectation that they will be a trustworthy agent or proxy on behalf of the client, while a data owner (“owner”) is an entity that provides data or has information generated about them in the process of using a service. 3 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 4. Current Truths About the Healthcare Business 1. Businesses are in control of healthcare industry1. – Obvious, but requires stating – Implies that there are market forces that necessitate that there are compelling economic motivations for the core processes, technologies and services offered by healthcare companies. 2. Healthcare payers and providers view patient data they receive as their own assets2. – “When I was practicing as a physician, I considered those records to be my property”2 – Whether a conscious market decision or execution of established best practice, a common domain assumption is that data from patients or the information that is generated from processing patient data is a part of the healthcare entity’s portfolio. 1. James Gubb, Oliver Meller-Herbert. “Markets in Health care - The theory behind the policy”. CIVITAS: Institute for the Study of Civil Society Report. Dec 2009. http://www.civitas.org.uk/nhs/download/Civitas_Markets_in_healthcare_Dec09.pdf 2. Tim O'Reilly. “A Manifesto on Health Data Rights”. O'Reilly Radar. June 22, 2009. http://radar.oreilly.com/2009/06/manifesto-health-data-rights.html 4 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 5. Current Truths (contd.) When the previous two assumptions are combined, a specific business model is produced where: –A trusted steward claims ownership over the data it collects. –The stewards provide access to this data to a client base for profit. –The data users in this client base include: • patients, who normally pay for these services to be performed, • agents that cover the cost of the services. • third party affiliates or business associates that are willing to pay for data in order to deliver their own products and services. • researchers who are investigating an area that is of interest to the healthcare entity. Unfortunately, this business model is not optimized to deliver either maximum benefit to the patient (who is the entity with the most at risk in this system) or to attain an equilibrium point where risk and reward is spread equally amongst all involved. 5 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 6. The Reason For Concern 6 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 7. How Did We Get Here? Shift in Medicine from General Practice to Specialization1,2 –one-on-one to one-to-many With specialization, i.e. a multi-tier, multiple-interaction, multiple-practitioner model of care delivery, a financial structure evolved in order to facilitate healthcare payments3. –i.e. health insurance companies, health maintenance organizations, etc. Currently, Chasm between Patient Expectation and Current Practice4. 1. Gerald Higgins. “The History of Confidentiality in Medicine: The Physician-Patient Relationship”. Canadian Family Physician 35 (April 1989): 921-926. 2. Mark Siegler. “Confidentiality in Medicine – A Decrepit Concept”. New England Journal of Medicine 307, no. 24 (1982): 1518-1521. 3. Terree P Wasley. “Health care in the twentieth century: a history of government interference and protection”. Moneywatch.com, April 1993. http://findarticles.com/p/articles/mi_m1094/is_n2_v28/ai_13834930/ 4. Tyrone Grandison, Rafae Bhatti. “HIPAA Compliance and Patient Privacy Protection”. The proceedings of the 13th World Congress on Medical and Health Informatics (MEDINFO). September 12-15, 2010. Cape Town, South Africa. 7 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 8. Patient-Centric Privacy Patient-Centric Privacy refers to: –The recognition that patients are a fundamental1 and integral2 part of the disclosure, access and use processes, and –The ability of the patient to control the release of their healthcare information The core assumption – data stewardship does not equate to data ownership By patient-centric, I am not referring to prior views that state that it is about manipulating artifacts at the patient-level, i.e. record-level or tuple-level controls. 1. fundamental - patients are the basic, foundational and essential building blocks of the system 2. integral - patients (and their input) are necessary to the completeness and usefulness of the system. 8 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 9. Related Work Privacy By Design – Foundational Principles are: 1) Proactive not Reactive, 2) Privacy as the Default, 3) Privacy Embedded into the Design, 4) Full-functionality - Positive Sum, not Zero-Sum, 5) End-to-End Lifecycle Protection, 6) Visibility and Transparency, and 7) Respect for User Privacy. SHARP Grants – In April of 2010, the Office of the National Coordinator for Health Information Technology (ONCHIT) in the US Department of Health and Human Services (HHS) awarded $60 million in grants under the Strategic Health IT Advanced Research Projects (SHARP) Program in four topic areas – Two of the areas are 1) Security and Health Information Technology & 2) Health care Application and Network Design. – Both areas seek to develop new technologies while ensuring and improving privacy and security. Both are just beginning. Privacy and Security Tiger Team (PSTT) – HHS HIT Policy Committee – On August 19th, 2010, the PSTT recommended the adoption of guidelines set out in the Fair Information Practices (FIP). – They state that "this overarching set of principles, when taken together, constitute good data stewardship and form a foundation of public trust in the collection, access, use, and disclosure of personal information“ – At the highest level, they assume that control is in the hands of the provider and they articulate initial proposals for facilitating patient consent. 9 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 10. The Current Operational Model 10 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 11. Highlights of the Current Model The process of delivering care: – patients give a healthcare entity all the information required by the medical practitioners to perform their job. – patients provide a valuable asset (i.e. data) to healthcare entities and also pay for the service that they are accessing. Healthcare entities maximize their profit by: 1. entering into revenue sharing agreements, based on patient data, with associates and third parties, 2. selling patient data to information brokers, who may re-package, collate and aggregate data to offer value-added services to optimize other businesses, and 3. utilizing the services of partners to make patient data more valuable. Healthcare entities assumes control of the ingested data and the patient is assumed to have no control over the use of her data. – Additionally, patient receives none of the revenue generated from the use of her data. It is argued that some of the profit-boosting activities of the healthcare entities subsidize the cost of care to the patient – This behavior may only translate into a cost reduction for the patient and never a (personal) revenue increase; as is the case for the business. The downsides of this model – The patient assumes a significantly higher proportion of the risk without gaining the (considerable) revenue upside that the healthcare entity enjoys. – The provider/payer is often incentivized to take significant risk; so long as the reward to the organization exceeds the expenditure needed to stem or repair any reputational damage and or trust erosion that may be incurred. 11 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 12. How Does One Get To a Patient-Centric System? What are the influencing/confounding factors/dimensions to collaboration? –Financial Incentive • Requires that the ROI,EL Valuation and the LP be calculated. * mathematical models can be created for each of these variables based on private revenue data and publicly-available data from national (and international) organizations, e.g. National Health Care Anti-Fraud Association (NHCAA), HHS’ Office of Civil Rights (OCR). • The incentive model would help payers (and providers) see the case for porting their systems * increased patient participation offer them a meaningful reward should translate into (rationalized) orders of magnitude more benefit to the payer. –Collective Willpower • A collective of focused, aware people working towards the goal. –Patient Knowledge • There is a low percentage of patients who are 1. aware of their rights with respect to their healthcare data and 2. know what healthcare payers and providers do with their data • Education will either reassure patients or spur them into action 12 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 13. What About the Technology Element? For immediate applicability in the American context – Leverage the Nationwide Health Information Network (NHIN)* effort, which is currently supported by the Office of the National Coordinator for Health Information Technology (ONC). • This work defines a collection of standards, protocols, legal agreements, specifications, and services that enable secure Health Information Exchange (HIE). Assumes – A Healthcare (Service) Bus, which securely transports healthcare messages throughout the network. – Common Core HIE Services, such as a Translation service, a Patient Identity Cross Referencing Service, conversion services, etc Introduces – A Financial Transaction Service • Triggered whenever an incoming request triggers a positive consent decision, and supervises the transfer of funds from utilized data and issues payments to the involved parties. – A Consent Server * The NHIN standards, services and policies are being developed by the NHIN Cooperative - a group of federal agencies, local, regional and state-level Health Information Exchange Organizations (HIOs) and integrated delivery networks. Initial recommendations have recently spurred work on a new initiative NHIN Direct. http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_gov__nationwide_health_information_network/1142 13 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 14. Patient-centric Privacy-enabled Healthcare Model for Current Systems 14 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 15. Technically Fostering Patient Involvement PERMISSIONS ( patient_ref_no char(18), Patient with patient_ref_no has decided to grant consent consent_decision Boolean, (consent_decision = 1) or not (consent_decision = 0) for her data_segment char(18), data of type data_segment to be used for purpose for_purpose by professional granted_person with the for_purpose char(18), understanding that negotiated_remuneration will be paid and granted_person char(32), further conditions further_constraints are met. delegated_person char(32), •Note that either granted_person or delegated_person must be blank. negotiated_remuneration int, •If delegated_person is specified, then this becomes a statement of the delegation of this consent to delegated_person. further_constraints char(32) ) CONSENT is a technical mechanism to enable individual choice. Exact mechanism unimportant UTMOST IMPORTANCE – GOAL –A new healthcare model where control of every facet of a patient’s data remains under her control during the entire information lifecycle. –Technically, access control mechanisms with native support for (advanced) consent (and delegation) management are the bedrock. –Also all systems set to enable the maximum level of privacy by default and patients must opt-in for data use (if the patient finds the associated remuneration acceptable). 15 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 16. What If This is Being Done From Scratch? Inherent assumptions would be: – Healthcare entities focus on delivering better service and that this is the only driver for their continued revenue success – Patients maintain ownership of and have contractual rights over their data. Conceptually: – After the patient pays for a service and provides her data to a healthcare entity, the entity publishes an anonymized synopsis of the patient data with a reference to the patient (or the patient’s account information). • Anonymization offers an added layer of security for identity protection. This entire process may be viewed as being similar to that of HIE registration. – Interested parties may query the Information Publication/Discovery resource and request to use the specific patient data that is relevant to them. • Use of this data requires consent from the data owner (i.e. the patient) and payment for using this data (i.e. sent to the patient’s account), which would be handled through a trusted Financial Transaction service. It should be noted that securing patient account information must be addressed before this model is deployed. – In lieu of having links back to the patient information, one could use previously stored consent management information, along with more creative reimbursement schemes, to achieve the same goal. 16 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 17. Patient-Centric Model: From Scratch 17 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 18. Initial Set of Hard Questions What is the motivation to include the patient in the loop? – The prevailing business model will persist as long as the public remains unaware of their lack of control and the inherent risk they face. – As previously hinted at, increased patient awareness, more transparency into healthcare business practices and an increasing number of healthcare data breaches will facilitate a need for change. – Adoption will also be accelerated by work on new fair ROI models for EHRs. Do we have all the components to make this a reality? – Components fall into four categories: business, technology, legislative and societal (BLTS). – Some business and technical components introduced here. • Up to YOU to define the technology components more fully. – The legislative and societal components involve: • policy advocacy to strengthen laws and regulations with regards to patients’ interests and • consumer education on their rights, current healthcare best practices and their role. Will the transition & maintenance costs be prohibitive? – Federal funding from the American Recovery Act of 2009 will provide fuel for the initial stages of HIT development (if core patient-centric privacy principles were included at design time). – The transition and maintenance costs for initiatives can hopefully be negligibly factored into the overall system cost. How is this going to happen? Who should lead it? – The likely agents of change should be the Federal government – who are the representatives of the people and the group who can effectively interface with all the stakeholders. – This effort requires a concerted collaboration between all the stakeholders in the healthcare system to be effective. 18 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing
  • 19. Conclusion As Healthcare is being transformed, it is an appropriate time to evaluate and implement models that ensure the long-term success of the industry going forward. The intention of this paper is to spur discussion and debate on this issue. The equating of data stewardship rights with data ownership rights by healthcare payers and providers have left the patient out of the loop. Correcting this issue requires a coordinated collaboration of healthcare stakeholders. Hopefully, this represents a starting point. 19 - 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing