Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)

Slides:



Advertisements
Similar presentations
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Advertisements

Formalization of Health Information Portability and Accountability Act (HIPAA) Simon Berring, Navya Rehani, Dina Thomas.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
HIPAA Health Insurance Portability and Accountability Act 1.
HIPAA Basics A Matter of Integrity. Introduction “A Matter of Integrity” defines HIPAA and protecting patient health information. Success depends on our.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Health Insurance Portability and Accountability Act (HIPAA)
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Problems with Notice and Consent? Helen Nissenbaum, NYU INCO-TRUST Workshop, May Work supported by: NSF ITR : Sensitive Information in.
On Privacy and Compliance: Philosophy and Law meets Computer Science Anupam Datta Stanford University Oakland PC Crystal Ball Workshop January 2007.
Data Protection Data Protection Acts 1988 & 2003 Directive 95/46/EC Privacy.
Contextual Integrity and its Formalization
Anupam Datta Anupam DattaCMU Joint work with Adam Barth, John Mitchell (Stanford), Helen Nissenbaum (NYU) and Sharada Sundaram (TCS) Privacy and Contextual.
Contextual Integrity in PORTIA PI: Helen Nissenbaum Students: Timothy Weber & Michael Zimmer New York University In collaboration with: Sam Hawala (U.S.
Enterprise Privacy Promises and Enforcement Adam Barth John C. Mitchell.
Privacy Challenges and Solutions for Health Information Systems John C Mitchell, Stanford University.
HIPAA Health Insurance Portability & Accountability Act of 1996.
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style PRIVACY AS & AND CONTEXTUAL INTEGRITY Helen Nissenbaum.
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
Contextual Integrity & its Logical Formalization 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
6 October 2006NHPRC Electronic Records Symposium Developing the HIPAA-Aware EAD Finding Aid The Concept of HIPAA Awareness Nancy McCall Michael Miers Phoebe.
Health Insurance Portability and Accountability Act (HIPAA)
PRIVACY AND HIPAA THE RIGHT THING TO DO. WHAT’S WRONG WITH THIS PICTURE? ? “ Did you hear that Jane from the 5 th floor is in the hospital?” “No!! Let’s.
Health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be.
Enhancing Communication Among Health Care and Educational Programs How Privacy Regulations Impact Delivery of Effective Services by Karl R. White National.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
1 Canadian Privacy Policy: Customizing E.U. Standards Remarks by Jennifer Stoddart Privacy Commissioner of Canada Privacy Symposium: Summer 2007 August.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
1 Changes to Privacy Regulations under ARRA May 4, 2009 Melissa Goldstein, J.D. The George Washington University School of Public Health and Health Services.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
The Protection of Personal Information Bill 13 February
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Health Insurance Portability and Accountability Act
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
E&O Risk Management: Meeting the Challenge of Change
Health Insurance Portability and Accountability Act
Disability Services Agencies Briefing On HIPAA
HIPAA Overview.
Privacy Policy the Law….
18734: Foundations of Privacy
Health Insurance Portability and Accountability Act
Presentation transcript:

Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)

Privacy in Health Care Patient DoctorSpecialist Electronic Health Record Patient Portal Insurer HIPAA Compliance

Broad Goal Protect privacy –Can a banker tell a marketer a customer’s address? Express policy precisely –Enterprise privacy policies –Privacy provisions from legislation Analyze privacy policies –Action complies with policy? –Policy enforces law?

Approach Privacy model –Agents communicating about each other Logic over model –Linear temporal logic Policies as logical formulas –Control expressive power Apply logical tools –Leverage LTL research

Contextual Integrity Philosophical account of privacy –Transfer of personal information –Describes what people care about Flow governed by norms –Agents act in roles in social contexts –Rejects public/private dichotomy Principles of transmission –Confidentiality, reciprocity, dessert, etc

Privacy Model for CI AliceBob Charlie’s SSN is Restrict messages –Messages about subjects Judgments over traces –Past and future relevant Agents reason about attributes

Access Control vs. Privacy Access control –Subject (= actor) –Object –Action Stateless –Except Chinese wall Discrete elements Privacy policies –Sender –Recipient –Subject (of message) –Attribute –Transmission principle Temporal –Past: Opt-in / opt-out –Future: Notification Structured attributes

Syntax Grammar for logic –  ::= send(p 1,p 2,m)p 1 sends p 2 message m | contains(m, q, t)m contains attrib t about q | inrole(p, r)p is active in role r | incontext(p, c)p is active in context c | t  t’Attrib t is part of attrib t’ |    |  |  x: .  Classical operators |  U  |  S  | O  Temporal operators Policies use a restricted class of formulas

CI Norms and Policies Policy consists of norms (+)inrole(p 1, r 1 )  inrole(p 2, r 2 )  inrole(q, r)  t  t’     (  )inrole(p 1, r 1 )  inrole(p 2, r 2 )  inrole(q, r)  t  t’     –  is an agent constraint –  is a temporal condition Norms assembled into policy formula –  p 1,p 2,q:P.  m:M.  t:T.incontext(p 1, c)  send(p 1, p 2, m)  contains(m, q, t)   {  + |  +  norms + (c) }   {   |    norms  (c) }

Sender roleSubject roleAttribute Transmission principle Gramm-Leach-Bliley Example Recipient role Financial institutions must notify consumers if they share their non-public personal information with non- affiliated companies, but the notification may occur either before or after the information sharing occurs

Expressiveness of CI Evaluated on privacy laws –HIPAA, GLBA, and COPPA Captured most privacy provisions –Missed de-identified health info in HIPAA Laws used most features –Roughly as expressive as required

Structure of Attributes Health Information Psychotherapy Notes Date of Birth AgeZodiac SignTest Results Heath care providers can tell patients their health information Heath care providers can tell patients their psychotherapy notes only if a psychiatrist has approved Sender roleRecipient roleSubject roleAttribute Health Information Psychotherapy NotesTest Results Health Information Psychotherapy Notes

Extensional vs. Intentional Extensional semantics –Equates policies with judgments –Ignores why judgments reached Intentional semantics –Policies as list of rules –Reason for judgment preserved Extensional combination tricky –Attribute inheritance

Difficulties in Combination Date of Birth AgeZodiac Sign Age AND= Date of Birth AgeZodiac Sign Date of Birth AgeZodiac Sign Age OR= Date of Birth AgeZodiac Sign Date of Birth

Refinement and Combination Policy refinement –Basic policy relation –Does hospital policy enforce HIPAA? P 1 refines P 2 if P 1  P 2 –Requires careful handling of attribute inheritance Combination becomes logical conjunction –Defined in terms of refinement

Compliance Strong compliance –Future requirements after action can be met –PSPACE Weak compliance –Present requirements met by action –Polynomial time Policy History Contemplated Action Judgment Future Reqs

Related Languages ModelSenderRecipientSubjectAttributesPastFutureCombination RBACRoleIdentity  XACMLFlexible o  o  EPALFixedRoleFixed  o  P3PFixedRoleFixed  o  o CIRole  Legend:  unsupported opartially supported  full supported CI fully supports attributes and combination

Conclusions Privacy about agents communicating –Different model than access control Sender, recipient, subject, attribute, transmission principle –Past and future important CI: A language for privacy policies –Based on linear temporal logic –Expresses most privacy laws Combination and compliance tractable

Questions?