GGF12, Brussels D.Voets, September 22, 2004 HealthGRID: Confidentiality and Ethical Issues Ir. B. Claerhout D.Voets – Custodix R&D –

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

MyGrid Security Issues Simon Miles University of Southampton.
PRIVACY ENHANCEMENT IN DATA MANAGEMENT IN E-HEALTH for GENomic Medicine IST
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Westbrook Technologies from Document Management’s Role in HIPAA.
Davis Wright Tremaine LLP Non-HIPAA Governmental Regulation of Healthcare Privacy and Security Sixteenth HIPAA Summit/The Privacy Symposium August 21,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
The strategic role of ICT in healthcare National strategies and micro-level implementations in Europe and Bulgaria Alexander Dobrev Communication & Technology.
Security Controls – What Works
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
EHealth Unit FP6 - 1st IST Call for Proposals 28/1/2003 The eHealth Strategic Objective Julian Ellis eHealth Unit, DG Information Society
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
Dorota Kilańska RN, PhD European Nursing Research Foundation (ENRF)
An Approach towards the Fulfilment of Security Requirements for Decision Support Systems in the Field of Evidence-Based Healthcare WIT Institute of Software.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Introduction to Health Law B. Barrowman September 2002.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
BioMedical Computing and Standards. BioMedical Computing Medical Equipment Cellular and system simulation Data mining for medical correlations Determining.
Challenges and the benefits of interoperability for the railway industry and the rail transport Eric Fontanel UNIFE General Manager.
ICT 1 Towards an Integrated Approach to Access Control to Health Information Presented by: Inger Anne Tøndel SINTEF Co-authors: Per Håkon Meland SINTEF.
Management Information Systems
Meeting The Technical Security Needs Primary and Secondary use of EHR systems Filip De Meyer
Österreich 2006 Austria 2006 Autriche 2006 Präsidentschaft der Europäischen Union Presidency of the European Union Présidence de L’Union européenne ★★★★★★
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Standard of Electronic Health Record
By: Dr Alireza Kazemi.  Computer science, the study of complex systems, information and computation using applied mathematics, electrical engineering.
The analyses upon which this publication is based were performed under Contract Number HHSM C sponsored by the Center for Medicare and Medicaid.
State Alliance for e-Health Conference Meeting January 26, 2007.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
Integrated Biomedical Information for Better Health Workprogramme Call 4 IST Conference- Networking Session.
EGEE is a project funded by the European Union under contract IST Risks of being on the Grid: the BioMedical challenge Yannick Legré CNRS/IN2P3.
Electronic Health Records: Healthcare System’s Common Trends Based on Cloud Computing Group 2: OU Jin FANG Ting
DICOM and ISO/TC215 Hidenori Shinoda Charles Parisot.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Internet2 Health Sciences Mary Kratz Internet2 Health Science Manager March Spring Member Meeting International Session.
Public Health Data Standards Consortium
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Scalable Trust Community Framework STCF (01/07/2013)
HEALTHGRID.ORG HealthGrid The European Healthgrid Initiative e-Health and the Grid: Projects and Prospects in the European Union Tony Solomonides on behalf.
Andrea Ricci - ISIS Brussels, 12 April 2012 Policy conclusions and way forward.
Teaching PbD at legal ManaMa students Dr. E. J. Kindt IPEN 2015.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
The NIST Special Publications for Security Management By: Waylon Coulter.
IFIC Grid Course, Valencia , Particle Therapy Motivation Project description Legal and ethical framework Status Faustin.
Biomedical Informatics and Health. What is “Biomedical Informatics”?
EGEE is a project funded by the European Union under contract IST Aims and organization of the Biomedical VO Yannick Legré CNRS/IN2P3 NA4/SA1.
CSE 5810 Biomedical Informatics and Cloud Computing Zhitong Fei Computer Science & Engineering Department The University of Connecticut CSE5810: Introduction.
Aligning Policy Agendas The case of personalised care and cure for healthy and active ageing Setting the scene for the DG Regio and Flanders Smart Specialisation.
The Healthgrids Ignacio Blanquer Universidad Politécnica de Valencia Spain EGEE Project, Medical Applications.
Eric Peirano BRIDGE Support Team, Technofi
Dorota Kilańska RN, PhD European Nursing Research Foundation (ENRF)
Similarities between Grid-enabled Medical and Engineering Applications
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Standard of Electronic Health Record
Non-HIPAA Governmental Regulation of Healthcare Privacy and Security
Presentation transcript:

GGF12, Brussels D.Voets, September 22, 2004 HealthGRID: Confidentiality and Ethical Issues Ir. B. Claerhout D.Voets – Custodix R&D –

GGF12, Brussels D.Voets, September 22, 2004 Overview of the Presentation Introduction –Evolution in healthcare Privacy –A Definition of Privacy –Privacy Protection Incentives Security –GRID Security –HealthGRID Security Requirements Privacy Enhancing Technologies –Definition –Privacy Protection in Practice PETs and the HealthGRID –Integrating GRID and PETs –Synergy of PETs and GRIDs –HealthGRID Issues –Future Research Conclusions

GGF12, Brussels D.Voets, September 22, 2004 Evolution in Healthcare Medicine, Genomics and ICT are developing in a symbiotic way. Key Areas: –Evidence Based Medicine –Genomics, Proteomics, Toxicogenomics, Pharmacogenomics –Medical Simulations –Medical Imaging –… Require Collection, Storage, Processing of vast amounts of data. Require dynamic interoperability. →Introduction of GRID technology in healthcare is unavoidable and critical factor for further successful developments in e-Health.

GGF12, Brussels D.Voets, September 22, 2004 Privacy Vulnerabilities Domain of High Energy Physics (HEP) has been driving force behind development of GRID technology (tools and middleware) – Lots of existing knowledge to be exploited for the HealthGRID Use of GRID technology in healthcare introduces new requirements: –Sensitive personal data of patients is treated →Need for strict confidentiality and enforced privacy protection. One of the many Challenges: –Protection of the human (privacy) rights while maximizing research productivity and efficiency in data handling.

GGF12, Brussels D.Voets, September 22, 2004 “a” Description of Privacy… “Privacy encompasses the right to control information about ourselves, including the right to limit access to that information... The right to privacy means the right to enjoy solitude, intimacy and anonymity. “ (Privacy on the Line, Whit Diffie and Susan Landau) ”From an evolutionary science viewpoint, the current trend toward the dissolution of individual privacy made possible by information technology could, in fact, prove to be a recipe for the end of the human species” (IEEE Security&Privacy 2003, Michael Caloyannides)

GGF12, Brussels D.Voets, September 22, 2004 Incentives for dealing with privacy issues: –Research ethics –Failure in protecting peoples’ privacy can have devastating consequences on business (e.g. public opinion, lawsuits) –Regulation (Europe): –Guidelines from Institutional Review Boards (informed consent) European Directive 95/46/EC (accepted as one of the world’s highest privacy standards) –Member state implementations –Regulation (others): –Health Insurance Portability and Accountability Act (H.I.P.A.A.) –Ontario Freedom of Information and the Protection of Privacy Act in Canada Privacy best practices: Informed consent or other legal measures should not be considered a substitute to technical privacy protection techniques! Privacy Protection Incentives

GGF12, Brussels D.Voets, September 22, 2004 GRID Security Technology GRID community has put a lot of effort into design of security measures. Authentication and Authorization have been main points of focus. Integration at the lower middleware level (CAS, VOMS) –Uniformity (developer APIs) –Interoperability (GLOBUS) Implementations still at an early stage Already useful for computational problems in healthcare –Similar to problems in the classical GRID domain. →Starting point for addressing confidentiality issues in HealthGRID. →Further development of these security mechanisms is needed to address specific e-Health related requirements.

GGF12, Brussels D.Voets, September 22, 2004 HealthGRID Security Requirements HealthGRID aims to extend use of GRID technology beyond distributed computing. Also aims to be a platform where different e-Health actors share and exchange large amounts of heterogeneous data. At this point the integration of Medical informatics (MI) and BioInformatics (BI) into BioMedical Informatics (BMI) plays an important role. The specific nature of genomic data introduces additional risks: –Genetic data not only concerns individuals, but also their relatives. –Genetic data can also give indications about future health or disease conditions. –An individual’s genotype is almost unique and stable. –The full extend of information contained in genomic data is not known yet. –Genomic data is easily misinterpreted by non-professionals.

GGF12, Brussels D.Voets, September 22, 2004 Safeguarding Confidentiality Aproaches from conventional healthcare practice : –Deployment of Classical Security Measures –Authorization and Access Control –Further development and implementation of existing GRID security technology. –Taking into account strict restrictions in healthcare. –‘Privacy through Security’ –Use of Privacy Enhancing Techniques (PET) –Eliminates/minimizes the collection of personally identifiable information. –Superior approach –‘Security through Privacy’ →PETs should be seen as complementary to Security

GGF12, Brussels D.Voets, September 22, 2004 Privacy Enhancing Techniques “A coherent system of ICT measures that protects privacy by eliminating or reducing personal data or by preventing unnecessary and/or undesired processing of personal data, without loosing the functionality of the information system.” (J. Borking) Note that: –With this definition, automated privacy negotiation or advertising techniques are excluded (P3P, WS-Privacy, EPAL). –Suggested terminology: “Privacy Supporting Techniques” (PST), “Privacy Advancing Technology” (PAT), ”Privacy Negotiation Techniques” (PNT), … –Coin them PxTs? CEN/TC251 standardization effort on AURTAF (Anonymity User Requirements for Trusted Anonymisation Facilities) Similar ISO initiative is planned.

GGF12, Brussels D.Voets, September 22, 2004 PETs: Privacy Protection in Practice Applications of PETs are numerous: –Clinical trials –Disease management studies –Exchange of sensitive (research) data –Daily privacy protected handling of sensitive data (e.g. Medical records in hospitals, insurance companies, …) –Market research studies –Anonymous sharing of information –… In Healthcare PETs are still focused on “Medical Information” but are actively deployed! e.g. Pseudonymisation services

GGF12, Brussels D.Voets, September 22, 2004 Integration of PETs in HealthGRID Active deployment of PETs in the HealthGRID could remove many barriers: –GRIDs know no borders… personal data however do… –Legal issues arise when processing (transporting) personal data cross-border –GRID’s delegation principle introduces liability issues (see further) –Collaborating organisations may not trust each other completely.

GGF12, Brussels D.Voets, September 22, 2004 So where do PETs fit in the GRID? In the application layer –Pseudonymised Database as a GRID resource. –Good starting point, easily portable from existing privacy aware medical data applications. As part of the GRID (upper) middleware layer –Policy management and advertising –Standardisation of PET technology –Privacy Protection ‘by default’ As a GRID service –Pseudonymisation Service  New developments and pilot projects will show what is needed.

GGF12, Brussels D.Voets, September 22, 2004 Privacy Protection and GRID can go hand in hand… –Small “cells” (e.g. geographical area, hospital, …) of anonymous data can lead to an increased re-identification risk (i.e. privacy risk) –A “virtual database service” (federation) combining several databases through distributed query techniques, can solve such problem –by giving the illusion to the user that a single database is being accessed –If provided through Trusted Third Parties (Privacy Policy Enforcing) Virtual databases, policy advertising … are Grid topics Synergy of PETs and GRIDs

GGF12, Brussels D.Voets, September 22, 2004 HealthGRID Issues Use of heterogeneous resources –How does a GRID user determine trustworthiness of a GRID resource? –What about certification? –As GRID is dynamic, not every resource is known in advance. –Dynamic solution: policy advertising and negotiating –Current efforts: WS-Privacy, WS-Policy, EPAL –But how are policies assured/enforced? Data replication –Increases efficiency –A replicated data source must: –be equally trustworthy –adhere to the same strict policies –Must be handled autonomously

GGF12, Brussels D.Voets, September 22, 2004 HealthGRID Issues (2) Delegation –Fundamental GRID concept. –Far from obvious in the medical world. –One remains responsible for rights passed on to others (resources), one becomes liable for actions performed on someone’s behalf –Restricted Proxy Certificates are a good starting point.

GGF12, Brussels D.Voets, September 22, 2004 Future Research Policy Enforcing and Assurance on a Technical Level –For security (authorisation policies) –For data protection (privacy policies) Auditing Mechanism (logging) –Non-repudiation –Legal framework Encrypted Storage for medical data Trustworthy federation of research databases. –Small cells of de-identified data –Decreased re-identification risk because of larger anonymity set. From the world of Distributed Computing: –Processing of Encrypted Data –Privacy Preserving Data Mining

GGF12, Brussels D.Voets, September 22, 2004 Conclusions Privacy Enhancing Technology could solve some confidentiality issues of GRIDs in healthcare projects. Security and Privacy are complementary concepts, rather than exclusive. Integration of PETs inside the HealthGRID may stimulate PET standardisation. GRID Effort should go to policy advertising and negotiation –Further, one must be able to ensure policies on a technical level. Further development and pilot projects will make clear: –The additional security requirements of HealthGRID applications. –On which level PETs are to be integrated.

GGF12, Brussels D.Voets, September 22, 2004 Thank you for your attention! Custodix NV Verlorenbroodstr. 120 B-9820 Merelbeke Belgium or