Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B.

Slides:



Advertisements
Similar presentations
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Advertisements

HIPAA What’s New? What Is HIPAA Health Insurance Portability and Accountability Act of 1996 Health Insurance Portability and Accountability Act.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Bringing HIPAA to Hospital Systems HIPAA impact on hospital systems viaMD solution for HIPAA compliance W e b e n a b l i n g Pa t i e n t A d m i t t.
Westbrook Technologies from Document Management’s Role in HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
CHAPTER 4 E-ENVIRONMENT
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Protecting the Privacy of Family Members in Survey and Pedigree Research Jeffrey R. Botkin, MD, MPH University of Utah.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Health Information Security & Privacy February 9, 2014 ONC Policy HIT Policy Committee Privacy and Security Workgroup Denise Anthony Sociology and ISTS.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Promoting Excellence in Family Medicine Enabling Patients to Access Electronic Health Records Guidance for Health Professionals.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Principles of medical ethics Lecture (4) Dr. rawhia Dogham.
Patients Bill of Rights. What is a Patient’s Bill of Rights? A list of patients rights. It offers guidance and protection to patients by stating the responsibilities.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Workshop on Health Examination Surveys (HES) Legal and ethical issues Susanna Conti, M. Kanieff, G. Rago Istituto Superiore di Sanità (ISS) (National Public.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
Community Level Data Capture for MDSR Photo:
Can We Have EHRs and Privacy Too? Dr. Alan F. Westin Professor of Public Law and Government Emeritus, Columbia University; Principal, Privacy Consulting.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
Standard Operating Procedures Joe Wherton Queen Mary University of London
State Alliance for e-Health Conference Meeting January 26, 2007.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
From Privacy to Information Governance Dr Petra Wilson Internet Business Solutions Group - Cisco.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
THE TENTH NATIONAL HIPPA SUMMIT ELECTRONIC HEALTH RECORDS NATIONAL HEALTH INFORMATION INFRASTRUCTURE LEGAL ISSUES APRIL 7, 2005 Paul T. Smith, Esq. Partner,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Working with HIT Systems
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
NHII 03 Standards and Vocabulary Group A CG Chute Mayo Clinic CG Chute Mayo Clinic This presentation does not necessarily reflect the views of the U.S.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Data Quality Improvement This material was developed by Johns Hopkins University, funded by the Department of Health and Human Services, Office of the.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Unit 11.2a: Data Quality Attributes Data Quality Improvement Component 12/Unit 11 Health IT Workforce Curriculum Version 1.0/Fall
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
M6728 Ethics in Research Informed Consent/IRBs Reporting Research Results.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Principles of medical ethics Lecture (4) Dr. HANA OMER.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
Right 1 - ACCESS Right to access health and community services I have a right to access health and community services that meet my identified needs.
Working Group on IT Security and Privacy in VA and NIH Sponsored Research Joel Kupersmith, MD Chief Research & Development Officer.
Medical Imaging Data Access and Sharing Meeting
Healthcare Privacy: The Perspective of a Privacy Advocate
NHII and EHR: Protecting Privacy and Security -
Lesson 1  7 Basic Components of an Effective Compliance Plan
HIPAA Security Standards Final Rule
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Privacy and Security Update - 5 Years After Implementation
Presentation transcript:

Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Assure consumer support through— –Consumer involvement in standards development through participation of consumer advocates at all levels (local, regional, national)

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Assure consumer support through— –Strong security management –Clearly defined and enforced access restrictions, with authentication, non-repudiation and audit trails –Extending protection to telehealth and communications –System transparency, with registration and disclosure of non-TPO users and uses –Effective enforcement

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Assure consumer support by— –Educating consumers about the benefits of health information sharing for-- Themselves directly Public health Research

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Provide readily ascertainable and understandable privacy rules –Provide federal leadership in resolving preemption issues Provide comprehensive, readily accessible educational resources and compliance materials, including model agreements for participants

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Develop standards and tools to ensure accurate location and matching of patient health information –e.g., a privately-managed, patient-controlled, voluntary, unique individual health identifier

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS HHS should support or conduct research and development of privacy-enhancing technologies and mechanisms for incorporation into the NHII

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Define the incidents of ownership and control in detail, and explain them accurately, e.g.: –When should an individual be able to withhold information from the record in whole or in part, and what are the implications for the provider? –When should an individual be able to restrict access by specific providers?

Confidentiality, Ethics, Privacy, and Access KEY RECOMMENDATIONS Recognize that there are significant ethical issues beyond privacy— –Managing genetic information –Appropriate use of IT tools –Relation between informed consent and privacy –Scope of consent for secondary use of data