Keeping Medical Data Private By Srivatsan Venkatesan.

Slides:



Advertisements
Similar presentations
Emergency Medical Response You Are the Emergency Medical Responder A 20-year-old cyclist on a mountain bike team was temporarily unconscious after falling.
Advertisements

Refugee camps Question 1 What are some difficulties that you think you would experience in the refugee camp *I would miss my family a lot *you would be.
PRIVACY IN HEALTH CARE SYSTEM: PROBLEMS AND POSSIBLE SOLUTIONS Tautvydas Jankauskas M.D. Rita Baneviciene M.D. Darius Petraitis Egle Kalinauskiene M.D.
Module 16: Professional Ethics
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Definition, pg 225 Introduction to the Practice of Statistics, Sixth Edition © 2009 W.H. Freeman and Company.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Internet probe can track you down to within 690 meters.
Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner.
“Scientists Work to Keep Hackers Out of Implanted Medical Devices” Justin Fisher.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
Kaiser Permanente Information Technologies. KP HealthConnect connect is the worlds largest privately owned electronic health record, securely connecting.
Legal considerations for nursing practice
By Lynette Thuo. Shakespearean tragedy  To make a story you will need a few information.  In the next two slide are some question you have to answer.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
 Lesson 06: Ethics. IEEE Code of Ethics Accept Responsibility. Avoid conflicts of interest. Reject bribery. Improve understanding of technology Do.
Computer Ethics.
HIPAA UPDATES. HIPAA – KNOWING WHAT IT IS Health Information Portability and Accountability Act “HIPAA” - federal law giving patients certain privacy.
GOD IS ABLE FAITH for the future ‘“Is anything too hard for the L ORD ? I will return to you at the appointed time next year, and Sarah will have a.
Abstract Background Objectives Summary & Conclusions Methods Data Collection & Processing for OQUIN C.Shaun Wagner, John Dodson, Wei Ding OQUIN IT Team.
Bedside Hand-Off Presented by the 5T TCAB Team.
Veterans Health Administration Office of Informatics and Analytics Do You See a Non-VA Health Care Provider? The Virtual Lifetime Electronic Record (VLER)
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Medical Liability Ana Rita Gomes Faculdade de Direito da Universidade Nova de Lisboa.
Today: What ethical considerations are needed when using humans as research subjects? Upcoming: Peer review exercise.
& Conducted August 23-25, 1998 N=1,000 “Likely” Registered Voters Nationwide, With A +3.1% Margin Of Error.
Genetic Testing. Testing, Testing… 1,2,3 Genetic testing is most often used to analyze human DNA to determine whether an individual’s genetic makeup indicates.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Legal Terminology Biomedical Technology Legal implications in health care  Malpractice: harmful, incorrect, or negligent practice or treatment of a.
The Use of Force Trista, Joe, Patty, Claire. Plot.
..TO HELP WITHSTAND A CRISIS Resources. Why are they important? During a crisis, RESOURCES in our life help us cope with our crisis. Resources can include.
Assessment & Reporting Spalding High School Community.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
MEDICAL LABORATORY SCIENCE ETHICS AND MEDICO-LEGAL ISSUES
Bioethics. How to identify a dilemma  Dilemma: exists when there is no “right” course of action in a certain situation but, instead, several options,
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Medical Appointments Part 1: Doctors, Dentists, and Their Patients.
WHAT IS CONSIDERED CONFIDENTIAL PATIENT INFORMATION? Information that is not publically available that has been disclosed in confidence between a patient.
Rene Descartes: “I think; therefore I am.”. 3.3: Data Ethics Statistics Chap 3: Designing Experiments.
Data Ethics Ethical issues can arise when we collect data from people Difficulties can be more severe for experiments – Impose treatments – Can possibly.
Ethical Issues in the Big Data Industry Martin - June 2015 Page 1/22 This article analyzes Big Data as an industry, not a technology, and identifies the.
Key Knowledge Confidentiality Year 4 Medical Ethics and Law Thread Course The Ethox Centre, University of Oxford.
INTRODUCTION TO HEALTH SCIENCE LAW AND ETHICS. MEDICAL LAW Medical law is the branch of law which concerns the rights and responsibilities of medical.
IS 360D Health Management Applications
Use arrow keys to move forward or backward through presentation
Identifying People With Data
Prayer.
How to Create a MyCare Account
WHERE THERE IS HELP, THERE IS HOPE
RCM questions you should ask when reviewing a medical billing company
What is your FICO IQ Quiz? Link to article attached.
Acquire Support Without Paying Any Amount | Bigpond Customer Service
Total Free Service for Bigpond Forgot Password Error |
24/7 Service for Bigpond Customer Service Error |
Solve Bigpond Forgot Password Hurdles |
Create Bigpond new account via Bigpond Customer Service |
For hassle-free Bigpond Forgot Password | Customer Service
BACK SOLUTION:
معلم الصف الثالث الابتدائي
Ethics in medical profiling and online medicine
Ethical Decision Making in Health Care
Units with – James tedder
ФОНД “СОЦИАЛНО ПОДПОМАГАНЕ”
Chapter 13: Ethics and Law
Patients Rights Activity
Privacy Violation Privacy Law Privacy Amendment
Impact Of A Security Breach
Presentation transcript:

Keeping Medical Data Private By Srivatsan Venkatesan

Background When doing medical studies, the patients are anonymous The data used by the research group contains ICD codes ICD codes are set of codes that represent medical issues diagnosed by doctors

Summary Set of ICD codes can be traced backwards to identify the person The research group was able to trace back medical issues of former masschusets governor William Weld and his family

Ethical issue If the ICD codes fall in the wrong hands it can be a breach of privacy It can be used to black mail Source of medical spam

Solution Not worry about the breach of privacy, hope nobody evil gets the data

Solution Not provide data to medical studies by the patient

Solution Implement algorithms as shown in the article to secure the ICD codes, so that an evil doer will not be able to do anything harmful even if he/she obtains the ICD codes.