Privacy Challenges and Solutions for Health Information Systems John C Mitchell, Stanford University.

Slides:



Advertisements
Similar presentations
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Advertisements

Declarative Privacy Policy: Finite Models and Attribute-Based Encryption 1 November 2 nd, 2011.
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
And the finer details of patient privacy TCH Confidential Understanding HIPAA.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
NAU HIPAA Awareness Training
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Privacy, Security and Compliance Concerns for Management and Boards November 15, 2013 Carolyn Heyman-Layne, Esq. 1.
TATA RESEARCH DEVELOPMENT AND DESIGN, PUNE, INDIA Automated HIPAA Compliance Checker STANFORD UNIVERSITY, CA, USA STANFORD UNIVERSITY, CA, USA Sharada.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
On Privacy and Compliance: Philosophy and Law meets Computer Science Anupam Datta Stanford University Oakland PC Crystal Ball Workshop January 2007.
Anupam Datta Anupam DattaCMU Joint work with Adam Barth, John Mitchell (Stanford), Helen Nissenbaum (NYU) and Sharada Sundaram (TCS) Privacy and Contextual.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Notice of Privacy Practices Nebraska SNIP Privacy Subgroup July 18, 2002 Michael J. Brown, MHA, CPA Vice-President, Administrative & Regulatory Affairs,
The Use of Health Information Technology in Physician Practices
HIPAA PRIVACY AND SECURITY AWARENESS.
Contextual Integrity & its Logical Formalization 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Michael R. Costa, Esq., M.P.H. Greenberg Traurig, LLP One International Place, 3 rd Floor Boston, MA (fax)
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
HIPAA HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
CH 10. Confidentiality A. Confidentiality about sensitive medical information is necessary to preserve the patient’s dignity. B. In order to receive payment.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
UNDERSTANDING WHAT HIPAA IS AND IS NOT
10 Patient Confidentiality and HIPAA
And the finer details of patient privacy
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Confidential Records and Protected Disclosures
Disability Services Agencies Briefing On HIPAA
Enforcement and Policy Challenges in Health Information Privacy
HIPAA Overview.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Analysis of Final HIPAA Privacy Modification Rule
Presentation transcript:

Privacy Challenges and Solutions for Health Information Systems John C Mitchell, Stanford University

Themes  Privacy  Two approaches  Policy-based systems: provide info only if privacy policy allows  Anonymization: perturb publicly released data to preserve privacy  Healthcare provides practical example  Some background information on US healthcare trends  HIPAA regulation (also HITECH, additional hospital policies)  Balance: want good medical care, privacy from insurers  Formalization of privacy policy  Add policy-based reasoning to information systems  Also enables educational tools, other applications  Many unsolved problems  Combine related policies  Integrate individual, aggregate privacy

US Healthcare Crisis Ahead  Aging population  Not enough care facilities  Increasing costs  Cannot afford care if current trends continue  What can we do?  Keep patients out of the hospital  5% of population incurs 30% of total cost, ~10% incurs 60% [NPR]  Help people stay in their homes longer  Information systems  Better bidirectional communication with patients  Better information  better diagnosis, fewer errors  Telemedicine, home monitoring can serve outpatients

Some terminology  Electronic Health Record (EHR)  Hospitals starting to store information electronically  Allow patients to interact with physicians  Personal Health Record (PHR)  Health Information Exchange (HIE)  Regional networking between hospitals, clinics  Telemedicine (Tel)  Remote monitoring, other applications

Privacy in Organizational Processes Patient medical bills Insurance CompanyHospitalDrug Company Patient information Patient Advertising GOAL: Respect privacy expectations in the transfer and use of personal information within and across organizational boundaries

What is privacy?  Contextual integrity  Normative framework for evaluating the flow of information between agents  Agents act in roles within social contexts  Principles of transmission  Confidentiality, reciprocity, dessert, etc  Differential privacy San DB= S ¢¢¢ San DB ’ = S’S’ ¢¢¢ Distrib. distance ≤  Adam Smith

Contextual Integrity  Philosophical account of privacy  Transfer of personal information  Describes what people care about  Flow governed by norms  Agents act in roles in social contexts  Information categorized by type  E.g., personal health information, psychiatric records, …  Rejects public/private dichotomy  Principles of transmission  Confidentiality, reciprocity, dessert, etc [Nissenbaum 2004, BarthDMN ‘06]

Example: accessing patient health info Patient DoctorSpecialist Electronic Health Record Patient Portal Surrogate HIPAA Compliance

Nurse Secretary Workflow example Patient Doctor Health Answer Health Question Appointment Request Health Question Privacy: HIPAA compliance+ Humans + Electronic system Utility: Schedule appointments, obtain health answers

Goals  Express policy precisely  Enterprise privacy policies  Privacy provisions from legislation  Analyze, enforce privacy policies  Does action comply with policy?  Does policy enforce the law?  Support audit  Privacy breach may occur. Find out how it happened

Privacy Model: “Contextual Integrity” AliceBob Charlie’s SSN Four identifiers of an action: 1)Sender 2)Receiver 3)Person this is about (subject) 4)Type of information

Sender roleSubject roleAttribute Transmission principle Gramm-Leach-Bliley Example Recipient role Financial institutions must notify consumers if they share their non-public personal information with non- affiliated companies, but the notification may occur either before or after the information sharing occurs

CI Norms and Policies  Policy consists of norms (+)inrole(p 1, r 1 )  inrole(p 2, r 2 )  inrole(q, r)  t  t’     (  )inrole(p 1, r 1 )  inrole(p 2, r 2 )  inrole(q, r)  t  t’       is an agent constraint   is a temporal condition  Norms assembled into policy formula   p 1,p 2,q:P.  m:M.  t:T.incontext(p 1, c)  send(p 1, p 2, m)  contains(m, q, t)   {  + |  +  norms + (c) }   {   |    norms  (c) } One technical slide for fun

Organizational process and compliance Contextual Integrity Organizational Objectives Information Policy Organizational Process Design Privacy Checker (LTL) Utility Checker (ATL*) Utility Evaluation Compliance Evaluation Norms Purpose

Auditing Business Process Execution Audit Logs Run-time Monitor Privacy Policies Utility Goals Audit Algs Policy Violation + Accountable Agent

HITECT Act and other extensions  Extends HIPAA to business associates  Closes HIPAA loophole  Tracking of information used in Payment, Treatment Operations (PTO)  Regulatory environment evolving  Additional provisions, e.g. minimum necessary information  a covered entity shall be treated as being in compliance … only if … limits such protected health information … to the minimum necessary to accomplish the intended purpose …

HITECH Excerpt… b) Disclosures Required to Be Limited to the Limited Data Set or the Minimum Necessary.— (1) In general.— (A) In general.— Subject to subparagraph (B), a covered entity shall be treated as being in compliance with section (b)(1) of title 45, Code of Federal Regulations, with respect to the use, disclosure, or request of protected health information described in such section, only if the covered entity limits such protected health information, to the extent practicable, to the limited data set (as defined in section (e)(2) of such title) or, if needed by such entity, to the minimum necessary to accomplish the intended purpose of such use, disclosure, or request, respectively. (B) Guidance.— Not later than 18 months after the date of the enactment of this section, the Secretary shall issue guidance on what constitutes "minimum necessary" for purposes of subpart E of part 164 of title 45, Code of Federal Regulation. In issuing such guidance the Secretary shall take into consideration the guidance under section 13424(c) and the information necessary to improve patient outcomes and to detect, prevent, and manage chronic disease. (C) Sunset.— Subparagraph (A) shall not apply on and after the effective date on which the Secretary issues the guidance under subparagraph (B). (2) Determination of minimum necessary.— For purposes of paragraph (1), in the case of the disclosure of protected health information, the covered entity or business associate disclosing such information shall determine what constitutes the minimum necessary to accomplish the intended purpose of such disclosure. (3) Application of exceptions.— The exceptions described in section (b)(2) of title 45, Code of Federal Regulations, shall apply to the requirement under paragraph (1) as of the effective date described in section in the same manner that such exceptions apply to section (b)(1) of such title before such date. (4) Rule of construction.— The in this subsection shall be construed as affecting the use, disclosure, or request of protected health information that has been de-identified. Our Translation… (b) Disclosures Required to be Limited to the Limited Data Set or the Minimum Necessary.— (1) In General.— (A) In General.— a covered entity shall be treated as being in compliance with HIPAA’s use, disclosure, or request of protected health information only if the covered entity limits such protected health information to the limited data set ( (e)(2)) or is the minimum necessary (note1) to accomplish the intended purpose. (B) Guidance.—Within 18 months, the Secretary should decide what is ‘‘minimum necessary’’, taking into guidance under section 13424(c) and the information necessary to improve patient outcomes and to detect, prevent, and manage chronic disease. (C) Sunset.—Listen to (A) until (B) takes effect. Prolog Code File hitech_13405_b.pl: permitted_by_13405_b(A) :- %is_minimum_necessary(A). is_belief_from_minimum(A), writeln('HITECH rule b;'). File basic_message_wrapper.pl: is_belief_from_minimum(A):- msg_from(A, X), has_msg_belief(A, _, minimum_necessary_ to_purpose, X).

What is the logical structure of HIPAA?  Allow action if  There is a clause that explicitly permits it, and  No clause explicitly forbids it  In more detail...  Action:  to, from, about, type, purpose, consents, beliefs   e.g. Dr., lab, patient, PHI, treatment, -, -  Example (a) Standard: (1) Permitted uses and disclosures. (ii) For treatment, payment, or health care operations, as permitted by and in compliance with ;

HIPAA Translation HIPAA Law § a.2 Covered entity must obtain an authorization for any use or disclosure of psychotherapy note, except if it is to be used by the originator of the psychotherapy notes for treatment; Category (cat): When the rule applies  From: covered entity, Type: psychotherapy note Exception (exc): When the rule does not apply  For: treatment, From: originator Requirement(req): The necessary condition for the rule to permit  Consented_by: originator CategoryExceptionRequirement u src m typ m pur u src c covered entitypsychotherapy notetreatmentoriginator Permitted_by_R :- cat ∧ ¬ exc ∧ req Forbidden_by_R :- cat ∧ ¬ exc ∧ ¬ req R_not_applicable :- ¬ cat ∨ exc

HIPAA Translation HIPAA Law § a.2 Covered entity must obtain an authorization for any use or disclosure of psychotherapy note, except if it is to be used by the originator of the psychotherapy notes for treatment; Permitted_by_R :- cat ∧ ¬ exc ∧ req Forbidden_by_R :- cat ∧ ¬ exc ∧ ¬ req R_not_applicable :- ¬ cat ∨ exc CategoryExceptionRequirement u src m typ m pur u src c +covered entitypsychotherapy notetreatmentoriginator -covered entitypsychotherapy notetreatmentoriginator Xcovered entitypsychotherapy notetreatmentoriginator

Combining Different Clauses Permitted_by_R 1 :- cat 1 ∧ ¬ exc 1 ∧ req 1 Forbidden_by_R 1 :- cat 1 ∧ ¬ exc 1 ∧ ¬ req 1 R 1 _not_applicable :- ¬ cat 1 ∨ exc 1 Permitted_by_R 2 :- cat 2 ∧ ¬ exc 2 ∧ req 2 Forbidden_by_R 2 :- cat 2 ∧ ¬ exc 2 ∧ ¬ req 2 R 2 _not_applicable :- ¬ cat 2 ∨ exc 2 Compliant_with_R :- Permitted_by_R 1 ∧ Permitted_by_R 2 ∧ … ∧ Permitted_by_R n ∧ ¬ Forbidden_by_R 1 ∧ ¬ Forbidden_by_R 2 ∧ … ∧ ¬ Forbidden_by_R n Rule 1Rule 2

Conflict Resolution (at translation time)  Conflict  One rule R1 allows an action while the other rule R2 forbids it  Disjoint Rules  There exist no action such that R1 and R2 both are applicable. (cat 1 ∧ ¬ exc 1 )  (cat 2 ∧ ¬ exc 2 ) =   Overlapping Rules  There exist some action such that R1 and R2 both are applicable. (cat 1 ∧ ¬ exc 1 )  (cat 2 ∧ ¬ exc 2 )    Subset Rules  There exist action such that whenever R2 is applicable so is R1. (cat 1 ∧ ¬ exc 1 )  (cat 2 ∧ ¬ exc 2 ) = cat 2 ∧ ¬ exc 2  Resolution  R1 is applicable when (cat 1 ∧ ¬ exc 1 ) ∧ ¬ (cat 2 ∧ ¬ exc 2 )

Logic Structure  Declarative  Allows automatic logical combination of the policies  Non recursive first order logic  HIPAA policy is a set of logic rules with acyclic dependency graph  Structured negation  Uses a subset of stratified negation  No function parameters  decidable in polynomial time  Complete. Terminates with bounded search.

Refinement and Combination  Policy refinement  Basic policy relation  Does hospital policy enforce HIPAA?  P 1 refines P 2 if P 1  P 2  Requires careful handling of attribute inheritance  Combination becomes logical conjunction  Defined in terms of refinement

Medical data in the cloud? Database Policy Engine Query Attribute- based Encryption Attribute- based Decryption Encrypted Medical Data Credentials Data Applications: Affiliated clinics Medical research

Attribute-Based Encryption PK “Doctor” “Neurology” “Nurse” “Phys Therapy” OR Doctor AND NurseICU  OR Doctor AND Nurse ICU SK  = =

Extracting ABE data policy  HIPAA, Hospital policy  Mapping : Action  {allow, deny}  Action:  to, from, about, type, purpose, consents, beliefs   Action characterized by  Attributes of data: from, about, type, consents  Attributes of recipient: to, purpose, beliefs  Data policy  Data with attributes: from, about, type, consents  Has associated access policy {  to, purpose, beliefs  | Policy(  to, from, about, type, purpose, consents, beliefs  ) = Allow}

Remote user Hospital Encrypted medical data in the cloud Database Policy Engine Query Attribute- based Encryption Attribute- based Decryption Encrypted Medical Data Credentials Data Applications: Affiliated clinics Medical research

Ongoing efforts  Hospital policy  Surrogate  Delegate  Education tools  Allow medical staff to pose questions, learn regulations  Theory: is there a canonical example hospital?  Combine with attribute-based encryption  Deductive access control within the enterprise  Cryptographic enforcement when data is exported  Model workflow and evaluate “least disclosure”, etc.  Audit  Medical environment: “break the glass”

Sponsoring Research Projects Looking for students, postdoc

Conclusion  Privacy  Policy-based systems: provide info only if privacy policy allows  Anonymization: perturb publicly released data  Healthcare provides practical test case  Formalization of HIPAA privacy policy  Add policy-based reasoning to information systems  Future work  Extend to hospital policies, other examples  Educational tools, other applications  Theory: is there a canonical example hospital?  Integrate individual, aggregate privacy