2002-09-20 PRIVACY ENHANCEMENT IN DATA MANAGEMENT IN E-HEALTH for GENomic Medicine IST-2001-38719.

Slides:



Advertisements
Similar presentations
Protecting People and Information
Advertisements

Tamtron Users Group April 2001 Preparing Your Laboratory for HIPAA Compliance.
Outsourcing & Repurposing Surveillance Videos
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Israel, 10th and 11th of December 2003 Italy Israel Bi-national Seminar on Digital Access to Scientific and Cultural Heritage Antonella Fresa MINERVA Technical.
Parma, 21st November 2003Minerva European Conference : Quality for cultural Web sites Quality Framework and Guidelines for Cultural Web Sites Isabelle.
Torun, 3 and 4 February 2003 The MINERVA Project Antonella Fresa – Technical Co-ordinator Ministerial NEtwoRk for Valorising Activising.
1 HL7 Educational Session – eHealth Week Budapest 2011 © Health Level Seven International, Inc. All Rights Reserved. HL7 and Health Level Seven.
Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
19/02/ Cyclades Kick Off Meeting What a European Co-ordinator expects from his partners and what a European Consortium expects from his Co-ordinator.
Brussels, Sept 2002, Jorge Vieira da Silva, EVE project : Needs of citizens related to the democratic process Scenarios for 2010.
January 15, 2007 RFID projects cluster meeting, Brussels1 Overview RFID Projects Cluster Meeting January 15, 2007 Brussels, Belgium ERA CO-ORDINATION STUDY.
Information Society Technologies CPA 10 Next generation micro & nano technologies in WP 2001, call seven DG Information Society European Commission.
Enabling Innovation with IT and Media © MFG Baden-Württemberg | 1 Giving European People a Voice in EU legislation.
5 Framework Programme ( ) Information Society Technologies 5 th Framework Programme ( ) Information Society Technologies Key Action.
Security standardization for Health Informatics ITU-T eHealth conference Geneva Dr Gunnar O. Klein convenor of ISO/TC 215/WG 4 Security Karolinska.
NPA: Business Improvement Techniques Contributing to Effective Team Working.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Building Sustainable Networks David Gosling Enhancing Student Employability Co-ordination Team.
All rights reserved © 2005, Alcatel Grid services over IP Multimedia Subsystem  Antoine Pichot, Olivier Audouin, Alcatel  GridNets ’06.
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
QuestionPoint virtual reference networks Graeme Miller.
Location Based Services and Privacy Issues
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
Consultative Group of Experts OTHER INFORMATION CONSIDERED RELEVANT TO THE ACHIEVEMENT OF THE OBJECTIVE OF THE CONVENTION Jack Fitzgerald Workshop on the.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
IST Open, self organising repository for scientific information exchange - SciX Žiga Turk University of Ljubljana, Slovenia
BS-ERA.NET project- state of the art Dr. Şerban PANAITESCU Project Coordinator International Learning Network (ILN) meeting on the implementation of International.
Copyright © eHealth Initiative, 2006 Physicians and Health Information Exchange (HIE) The Doctor-Patient Relationship Privacy and Information Sharing.
Linked2Safety Project (FP7-ICT – 5.3) A NEXT-GENERATION, SECURE LINKED DATA MEDICAL INFORMATION SPACE FOR SEMANTICALLY-INTERCONNECTING ELECTRONIC.
A platform of for knowledge and services sharing Fernando Ferri IRPPS-CNR.
KMIP 1.3 SP Issues Joseph Brand / Chuck White / Tim Hudson December 12th,
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Business Analytics BI applications to support human and automated decision making Business Analytics—predict future outcomes Decision Support Systems.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Information Systems Controls for System Reliability -Information Security-
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
The Internetworked E-Business Enterprise
Meeting The Technical Security Needs Primary and Secondary use of EHR systems Filip De Meyer
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
1 ROADS Services Training Group LOCAL AUTHORITY ROADS CONFERENCE 2015 Reforms, Challenges and Safety Treacy’s West County Hotel, Ennis, May 2015.
PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Act smart. get connected. Global electronics Club – Guided Tour.
Web 2.0 Inverse [1/2.0] Powered By Neural Networks Bringing Oneness To The Web Presented By:- Ajit Singh, Co-Founder STuNNets.
ELOGMAR-M Review Meeting, Shenzhen, 31/03/ First Review Meeting - Web-based and Mobile Solutions for Collaborative Work Environment with Logistics.
CRES – 7/2007 Transfer of experience for the development of solar thermal products TRANSOLAR Contract No: EIE/06/107/SI Duration:1/11/2006 – 31/10/2008.
Accreditation and Quality Labelling of EHRs in Europe The role of ProRec centres and the EUROREC Institute Dr. François MENNERAT Secretary General.
AUSTRALIAN ACCESS FEDERATION. Who we are Shared service for R&E Provide the trusted authentication framework for:  Universities  Education  Research.
GGF12, Brussels D.Voets, September 22, 2004 HealthGRID: Confidentiality and Ethical Issues Ir. B. Claerhout D.Voets – Custodix R&D –
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Service Organization Control (SOC)
High Performance Computing Center – HLRS
e-Security Solutions Penki Kontinentai Vladas Lapinskas
“Real World” METEOR Implementation Issues
General Data Protection Regulation “11 months in”
Presentation transcript:

PRIVACY ENHANCEMENT IN DATA MANAGEMENT IN E-HEALTH for GENomic Medicine IST

The Consortium Custodix N.V., Belgium (project co-ordinator) Trust Service Provider (Privacy Enhancing Technologies) VITAMIB SARL, France “Dot-Com” Research Organisation with experience in Genetic Medicine

The Project PRIDEH-GEN : PRIvacy enhancement in Data management in E-Health in Genetic Medicine IST Starting Date: Duration 18 months Efforts:21 Manmonths Type of project: Accompanying measure url=

The Project PRIDEHINFOGENE PRIDEH-GEN

INFOGENE INteractive platform FOr personal GENEtic profile construction, decision support IST Starting Date: Duration 36 months Research

INFOGENE Objectives INFOGENE server –GeneKiosk: public genetic web kiosk –InfoGenie: intelligent personal advisor –GeneStudio: design & verify user interaction Towards citizens and healthcare professionals Genetic risk advice / Knowledge

PRIDEH PRIDEH: PRIvacy enhancement in Data management in E-Health IST Starting Date: Duration 24 months Efforts: 62 Manmonths Type of project: Take-up (Trials) url=

What is a Take-Up project ? Builds on services/products already available Take up by the market is perceived as slow Better acceptance and take-up through the project Pre Take-Up Take-Up Increased Use & Deployment

Take-up Focus Lowering of threshold for deployment of PETs Highlight the added value of PETs –Information unblocking –Privacy protection, legal added value Trust in TTP based PET service provision through QA Legal framework (legal experts)

Degrees of Identifiability First order identifiability –Direct linkage to nominative values. Second order identifiability –Information hidden in data records. –Correlation between data records.

Role of PET Privacy Protection Legitimate Processing of Sensitive Information Legitimate Processing of Sensitive Information e-Privacy Enhancing Techniques

Privacy Enhancing Techniques (P.E.T.s) Prohibiting creators and maintainers of information from disclosing it to inappropriate parties. Preventing the unauthorized or inappropriate (direct or indirect) establishment of a person’s or an organization’s identity. APPROACH E-Privacy includes the right of individuals and organisations to determine for themselves when, how and to what extent information about them is communicated to others Examples of P.E.T.s: Anonymisation, Pseudonymisation, Controlled Database Pollution, Proxy-services and Privacy Enhanced Intelligent Software Agents No Information Exchange P.E.T.s

Sources No storage All traffic between entities is encrypted & entities authenticate each other Registers PPE Privacy Processing Engine Processing is based on Cryptographic techniques

Pseudonymisation Server Secure HTTP Server Pseudonymisation TTP CUSTODIX HTTP Server Register Sources The Interactive Data Collection Model

Genomic Data Privacy New Issues: determine degree of identifiability. (Infogene-Vitamib, Prof. Dr. G. Brugal) Advanced Knowledge Discovery technology (A.I., pattern detection, neural networks, self learning systems, intelligent agents) Intelligent PETs (PRIDEH-Custodix, Prof. Dr. G. De Moor)

PRIDEH-GEN WP 1: Management and co-ordination WP 2: Inventory of the Techniques –D 2.1: Inventory Report on Privacy Enhancing Techniques (Sept. 2003). –By Custodix (Belgium), PRIDEH WP 3: Inventory of the Needs –D 3.1: Inventory of the Privacy Protection Needs (Sept. 2003) –By INFOGENE, Vitamib (France) WP 4: Production of the Guidelines & Dissemination. –D 4.1: Privacy Protection Guidelines for Genomic Medicine (Dec 2003)

Contact Address  CUSTODIX (Project Co-ordination)  Phone:  Fax:  

Thanks for listening With privacy in mind....