TATA RESEARCH DEVELOPMENT AND DESIGN, PUNE, INDIA Automated HIPAA Compliance Checker STANFORD UNIVERSITY, CA, USA STANFORD UNIVERSITY, CA, USA Sharada.

Slides:



Advertisements
Similar presentations
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Advertisements

Frequently Asked Questions…. …about HIPAA Notice of Privacy Practices and Acknowledgement.
Formalization of Health Information Portability and Accountability Act (HIPAA) Simon Berring, Navya Rehani, Dina Thomas.
Declarative Privacy Policy: Finite Models and Attribute-Based Encryption 1 November 2 nd, 2011.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
1 HIPAA and Research and YOU. 2 INTRODUCTION Rule #1:Don’t Panic Rule #2:Bottom Line for Researchers: HIPAA is Manageable thru Education/Awareness and.
HIPAA Health Insurance Portability and Accountability Act.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA Health Insurance Portability and Accountability Act 1.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Are you ready for HIPPO??? Welcome to HIPAA
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
2 H. Westley Clark, M.D., J.D., M.P.H., CAS, FASAM Director Center for Substance Abuse Treatment Substance Abuse Mental Health Services Administration.
Privacy Challenges and Solutions for Health Information Systems John C Mitchell, Stanford University.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
HIPAA – How Will the Regulations Impact Research?.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Health Insurance Portability and Accountability Act.
HIPAA HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA THE PRIVACY RULE Reviewed December 2012.
HIPAA CONFIDENTIALITY
HIPAA Administrative Simplification
Health Insurance Portability and Accountability Act
HIPAA Pros - Disclosures
Confidential Records and Protected Disclosures
Disability Services Agencies Briefing On HIPAA
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act
Analysis of Final HIPAA Privacy Modification Rule
HIPAA Privacy and Security Update - 5 Years After Implementation
Presentation transcript:

TATA RESEARCH DEVELOPMENT AND DESIGN, PUNE, INDIA Automated HIPAA Compliance Checker STANFORD UNIVERSITY, CA, USA STANFORD UNIVERSITY, CA, USA Sharada Sundaram Peifung E LamJohn C Mitchell

Background and Motivation Hospitals collect a lot of data Personal Health records, like Medications, Mental Health information. For efficient health care, this data should be globally readily available. Technology could make it simple to collect, search, store and distribute this data. Security and Privacy  Business Process  Secure Transmission and Storage  Access Control, Right management Covered Entity Business Associates Patient Parents Minors Relatives Public Release Covered Entity

Health Insurance Portability and Accountability Act (HIPAA) Aim  The standards are meant to improve the efficiency and effectiveness of the nation's health care system by encouraging the widespread use of electronic data interchange in the U.S. health care system. National Standard  To protect the privacy of Personal Health Information (PHI)  For electronic health care transactions Rules of PHI disclosure  type of data  its uses  the end user  the person whose data it is, etc.

Vanderbilt Medical Foundation NurseDoctor Server Patient Message Passing Portal  web based centralized repository of patient’s health records.  Patients and Medical professionals exchange information like prescriptions, lab results, payment  Remote access to personal health information MyHealth and HIPAA  Difficult to tell if online systems are HIPPA compliant.  The cost of litigation for non HIPAA compliance is high!  HIPAA is difficult to understand for software professionals.

Vanderbilt Medical Foundation NurseDoctor Server Patient Message Passing Portal  web based centralized repository of patient’s health records.  Patients and Medical professionals exchange information like prescriptions, lab results, payment  Remote access to personal health information MyHealth and HIPAA  Difficult to tell if online systems are HIPPA compliant.  The cost of litigation for non HIPAA compliance is high!  HIPAA is difficult to understand for software professionals. Privacy Policy

Policy Specification Standalone  Not coupled with the Software Access Control  Role based, context based access control Auditable  Understand policy compositionally

Logic Program Legal Example Rules:  sibling(X, Y) :- parent_child(Z, X), parent_child(Z, Y).  parent_child(A, B) :- father_child(A, B); mother_child(A, B). Facts:  mother_child(sonia, rahul).  mother_child(sonia, priyanka). Queries:  ?- sibling(rahul, priyanka). Yes HIPAA Law Permitted_by_HIPAA(A):- from(A, healthcare_provider), to(A, healthcare_provider), for(A, treatment). Hospital Specific Information  Role(nurse, healthcare_provider).  Role(doctor, healthcare_provider).  Role(carla, nurse).  Role(jd, doctor). Action of sending the PHI  Permitted_by_HIPAA(A)? Logic Programming and Law

Formal Model - Action u src, u dst, u abt ∈ U (the set of users or agents), m typ ∈ T (the set of types of messages), m pur ∈ P (the set of purposes), a reply ∈ A (the set of actions), a =, where c = ∈ C (the tuple of consents) with u by ∈ U (the set of users) and ct typ ∈ CT (the set of consent types), b = ∈ B (the tuple of beliefs) with u by, u abt ∈ U (the set of users) and bf ∈ BF (the set of beliefs). What medication to give leukemia kid? u src u dst u abt m typ m pur a reply cb CarlaJDKidPHItreatment---

Ground Facts %Roles: inRole(carla, nurse). inRole(jd, intern). inRole(j, janitor). %TRANSITIVE CLOSURES: inRole(intern, doctor). inRole(doctor, covered_entity). %RELATION: employee_of(jd, shh). parent_of(kid, cox). business_associate(sgh, shh). LawyerJanitorNurseIntern Employees Business Associate Covered Entities

HIPAA Translation HIPAA Law § a.2 Covered entity must obtain an authorization for any use or disclosure of psychotherapy note, except if it is to be used by the originator of the psychotherapy notes for treatment; Category (cat): When the rule applies  From: covered entity, Type: psychotherapy note Exception (exc): When the rule does not apply  For: treatment, From: originator Requirement (req): The necessary condition for the rule to permit  Consented_by: originator Permitted_by_R :- cat ∧ ¬ exc ∧ req CategoryExceptionRequirement u src m typ m pur u src c covered entitypsychotherapy notetreatmentoriginator

HIPAA Translation HIPAA Law § a.2 Covered entity must obtain an authorization for any use or disclosure of psychotherapy note, except if it is to be used by the originator of the psychotherapy notes for treatment; Permitted_by_R :- cat ∧ ¬ exc ∧ req Forbidden_by_R :- cat ∧ ¬ exc ∧ ¬ req R_not_applicable :- ¬ cat ∨ exc CategoryExceptionRequirement u src m typ m pur u src c +covered entitypsychotherapy notetreatmentoriginator -covered entitypsychotherapy notetreatmentoriginator Xcovered entitypsychotherapy notetreatmentoriginator

Combining Different Clauses Permitted_by_R 1 :- cat 1 ∧ ¬ exc 1 ∧ req 1 Forbidden_by_R 1 :- cat 1 ∧ ¬ exc 1 ∧ ¬ req 1 R 1 _not_applicable :- ¬ cat 1 ∨ exc 1 Permitted_by_R 2 :- cat 2 ∧ ¬ exc 2 ∧ req 2 Forbidden_by_R 2 :- cat 2 ∧ ¬ exc 2 ∧ ¬ req 2 R 2 _not_applicable :- ¬ cat 2 ∨ exc 2 Compliant_with_R :- Permitted_by_R 1 ∧ Permitted_by_R 2 ∧ … Permitted_by_R n ∧ ¬ Forbidden_by_R 1 ∧ ¬ Forbidden_by_R 2 ∧ … ¬ Forbidden_by_R n Rule 1Rule 2

Combining Different Clauses HIPAA Law § a.2 Covered entity must obtain an authorization for any use or disclosure of psychotherapy note, except if it to be used by the originator of the psychotherapy notes for treatment; CategoryExceptionRequirement u src m typ m pur u src c covered entitypsychotherapy notetreatmentoriginator CategoryExceptionRequirement u src m typ R510 covered entityhealth recordsPermitted_by_R510(a) HIPAA Law § a.1.v Standard: A covered entity may not use or disclose protected health information, except as permitted or required by this subpart or by subpart C of part 160 of this subchapter. Permitted uses and disclosures. A covered entity is permitted to use or disclose protected health information as pursuant to an agreement under, or as otherwise permitted by, § ; covered entitypsychotherapy notePermitted_by_R510(a)

Conflict Resolution Conflict  One particular rule allows an action while the other forbids it. Given two rules R1 and R2 Disjoint Rules  There exist no action such that R1 and R2 both are applicable. (cat 1 ∧ ⁄exc 1 )  (cat 2 ∧ ⁄exc 2 ) =  Overlapping Rules  There exist some action such that R1 and R2 both are applicable. (cat 1 ∧ ⁄exc 1 )  (cat 2 ∧ ⁄exc 2 )    Subset Rules There exist action such that whenever R2 is applicable so is R1. (cat 1 ∧ ⁄exc 1 )  (cat 2 ∧ ⁄exc 2 ) = cat 2 ∧ ⁄exc 2 Resolution  R1 is applicable when (cat 1 ∧ ⁄exc 1 ) ∧ /(cat 2 ∧ ⁄exc 2 )

Logic Structure Non recursive first order logic  An HIPAA policy is a set of logic rules such that the dependency graph is acyclic. Structured Negation  Uses a subset of stratified negation Without Function parameters  Makes it complete  Terminates. Bounded search. Declarative Nature  Allows automatic logical combination of the policies. Decidable in Polynomial Time  Terminates with correct output.

Restrict Expressability Temporal relations  Current action based on Past  Save history with the tags. Search and allow.  Future obligations: Schedule a search through history and identify the necessary obligations No Functions of parameters  Compliance checker is more predicate reasoning  Incidentally for all the rules in the law first order logic suffices Stratified negation  Systematic use of negation.  Sections of the law need to be translated carefully

Online HIPAA policy verification engine HIPAA Law § Standard: Uses and disclosures of protected health information subject to an agreed upon restriction. as otherwise provided in § (a). Nurse ‏ Doctor Janitor What medication to give lukemia kid? Please clean the room 42 Attached are Tom’s blood test results The latest reports would include a $10 surcharge Tom’s daughter’s medical report Attached are your ex-wife’s test results :- ['H pl']. permitted_by_16 4_502_c(A) :- is_from_covered Entity(A), is_phi(A), (permitted_by_1 64_522_a_1(A); permitted_by_16 4_522_a(A)), writeln('HIPAA rule 164_502_c;'). permitted_by_16 4_522_a(A)), writeln('HIPAA rule 164_502_c;'). kid Tom Liz Suri TPO Pay TPO Adm TPO Tom

Prototype HIPAA AdvisoryHIPAA Compliance checker

Uses of this translation Can unauthorized insider get phi? Can outsider get phi? Change this Tests  Verification of implementation. Runs individual test cases.  Exhaustive search  Law cases: Very elaborate to code. Simple ones were satisfied by HIPAA.

Insider gaining PHI § Uses and disclosures to carry out treatment, payment, or health care operations. – (c) Implementation specifications: Treatment, payment, or health care operations. (1) A covered entity may use or disclose protected health information for its own treatment, payment, or health care operations. Covered Entity Nurse PHI Don’t go in that room as patient has SARS

Outsider gaining PHI § Uses and disclosures of protected health information: general rules. – (a) Standard. A covered entity may not use or disclose protected health information, except as permitted or required by this subpart or by subpart C of part 160 of this subchapter. (2) Required disclosures. A covered entity is required to disclose protected health information: – (ii) When required by the Secretary under subpart C of part 160 of this subchapter to investigate or determine the covered entity's compliance with this subpart. Entire database of personal health info For compliance verification doctorGovernment Secretary Covered Entity

Insider then Outsider doctor Covered Entity Freelance journalist In the PastPresent

Conclusions Modularity  With the separation of law and hospital specific facts. Executable Law  A standard HIPAA policy implemented everywhere. Verifiable  Easy to read and understand by Software Engineers, Lawyers, Health Care professionals. Proof of satisfiability  Returns the rule that satisfies the query result. Composeability of different policies?  OK at the clause level; more work needed on hospital policy + HIPAA Auditability  Interpretation of the query log to obtain the proper insights. Anomalies  Testing of policy reveals corner cases in HIPAA law

Thank You!

Open source Project: § Uses and disclosure of protected health information § Uses and disclosure to carry out treatment, payment, or health care operations. Code Illustration

Challenges Difficult for engineers to interpret law What do we model? How much detail should we model? Is it complete? Is there a strategy for a patient to get his questions answered? Is one translation better than other? Laws are not written to be logical!! HIPAA specifies what to implement not how. It definitely does not replace the human auditor Difficult to formalize exactly, its based on interpretation and requires a lot of iterations of corrections.

Rules Translated Standard Disclosure Minimum Necessary De-Identified Information Disclosure Disclosure to Business Associates Personal representatives Whistle blowers § Uses and disclosure of protected health information. § Uses and disclosure to carry out treatment, payment or health care operations.

Assumptions Everything can be represented as messages. All fields are accurate. Ideal world with authenticated / authorized identities. All information is passed through the system. Its not replacing the HIPAA training but assisting it. Few parts like the ‘doctor believes in good judgement’ could not be coded.

Formal Results Soundness:  Every provable query is universally valid, i.e., true in all domains under standard semantics.  Reports no false positives Completeness:  Every universally valid formula, under standard semantics, is provable.  Reports all vulnerabilities Effectiveness:  There is a proof-checking algorithm that can correctly decide whether a given sequence of symbols is a valid proof or not

Potential Shortcomings in HIPAA There are many such outside agents who could gain legitimate access to PHI and are not regulated by HIPAA after they gain access. HIPAA does not regulate information once it leaves their definition of covered entity. DISCLAIMER: All these shortcomings are based on what we looked at. Might be they are not there at all.

Cover all agents who hold phi of other people under HIPAA. Treat them as covered entities. During emergency the patient data should be available easily to any person who can help at that moment. Surprisingly there is no mention of emergency! The system implementation at a hospital should be resilient to id thefts along with having all the security features in place. Suggestions