Refrain Policy Vocabulary HL7 Security WG Kathleen Connor VA (ESC) January 2012.

Slides:



Advertisements
Similar presentations
LOCAL IPP REGULATIONS SEWER USE ORDINANCES Sandra Diorka Director of Public Services Delhi Charter Township.
Advertisements

AN OVERVIEW OF DATA PROTECTION LAW IN THE GCC NICK OCONNELL, Senior Associate – TMT JUNE 2013.
Digital Assets Presented by Sharon Rivenson Mark, Esq. and Shirley B. Whitenack, Esq. Adapted from Presentation by Catherine A. Seal, Esq.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Implementation of Privacy Board Reviews at PCMC Mary Thomason, Intermountain Healthcare Privacy Board Chair.
The Data Protection (Jersey) Law 2005.
FORA’s Role in Land Use Decisions September 13, 2013 FORA Board Meeting Jon Giffen Authority Counsel.
Privacy and Information Security Essentials
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Complying with Privacy to Enable Innovation & Research
Obligation Vocabulary Work in Progress HL7 Security WG Kathleen Connor VA (ESC) January 2012.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Models for Health Information Exchange January 7, 2013.
University of Miami1 HIPAA Survival Skills An Introduction to HIPAA and Research University of Miami Human Subjects Research Office October 31, 2006 Evelyne.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Data Segmentation Model 17 Jan 2012 John (Mike) Davis HL7 Security Co-Chair.
Hong Kong Privacy Code on Human Resource Management
2/16/2010 The Family Educational Records and Privacy Act.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Per Anders Eriksson
Health Insurance Portability and Accountability Act (HIPAA)
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
2012 VA IRB Administrators Meeting Stephania H. Griffin, JD, RHIA, CIPP/G VHA Privacy Officer Director, Information Access and Privacy Privacy Officer.
National Smartcard Project Work Package 8 – Security Issues Report.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
© 2007 The MITRE Corporation. MITRE Privacy Practice W3C Government Linked Data Working Group Michael Aisenberg, Esq. 29 June 2011 Predicate for Privacy.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
Chapter 8 Audit Planning and Analytical Procedures
Office of the Secretary Office for Civil Rights (OCR) The HITECH NPRM: Overview of Research Comments October 19, 2010 Christina Heide, JD HHS Office for.
HIPAA SURVIVAL SKILLS: An Update University of Miami1 Marisabel Davalos, M.S.Ed., CIP Associate Director of Educational Initiatives November, 2008.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
HIPAA Privacy The Morning After Panel What do we do now? William R. Braithwaite, MD, PhD (moderator) Washington, DC Ross Hallberg, Corporate Compliance.
Policy and Implementation Plan for Public Access to Scientific Publications and Digital Data from VA-Funded Research Tom Puglisi, PhD, ORO Executive Director.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
HIPAA and Human Subjects Research IRB Member CE May 2014 Slideshow by Sean Horkheimer.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 9 Designing Databases 9.1.
Personal data protection in research projects
VETERANS HEALTH ADMINISTRATION SLIDE 0 New Requirements for VA ORD Investigators: Implementation of Data Management and Access Plans.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
The NAPHSIS/NCHS Collaboration Past Successes and Future Challenges Salt Lake City, UT June 3 rd – 7 th, 2007 Increasing the Use and Accessibility of Vital.
CIRTL Data Sharing 10/9/15. New Opportunities The CIRTL Network Commons (CNC) offers the potential for easier access to data for evaluation purposes.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
HIPAA and RESEARCH 5 th Thursday May 31, Page 2.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule Melinda Hatton -- Oct. 31, 2002.
Main Line Hospitals Institutional Review Board HIPAA Policy Changes 2013 Anne Marie Hobson, BSN, JD, ORA Director.
Obligations of Educational Agencies: Parents’ Bill of Rights
General Data Protection Regulation
APP entities (organisations)
Medical Imaging Data Access and Sharing Meeting
Electronic Health Record
HL7 Security Working Group Plenary Working Group Meeting 9-14 September 2012 Baltimore, Maryland Access Control.
EHR System Function and Information Model (EHR-S FIM is based on EHR-S FM R2.0) CP.1.2 Manage Allergy, Intolerance and Adverse Reaction List aka DC
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
GDPR Workshop MEU Symposium Prague 2018
Electronic Health Record Access Control 7
Purpose of Use CBCC WG 12/20/2016 John “Mike” Davis.
The General Data Protection Regulation: Are You Ready?
Analysis of Final HIPAA Privacy Modification Rule
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

Refrain Policy Vocabulary HL7 Security WG Kathleen Connor VA (ESC) January 2012

Refrain Policy Vocabulary Proposal Propose that HL7 develop a “Refrain Policy” Code System to be used as Security Metadata Used to encode types of Refrain Policies Would require adding a code to the Refrain Policy Class for Refrain Policy Type values

Relation between Obligation and Refrain Policies Ambiguity about functions of Obligation Policy and Refrain Policy HL7 DAM definition for Obligation Policy: – May be used to indicate that the receiver of an information object may not be allowed to re-disclose or persist that information object indefinitely ISO specifies that an Obligation Policy is “event- triggered and define actions to be performed by manager agent” HL7 DAM definition for Refrain Policy: – Indicates that a specific action is prohibited based on specific access control attributes e.g., purpose of use, information type, user role, etc. ISO species that a Refrain Policy “defines actions the subjects must refrain from performing”

Relation between Obligation and Refrain Policies Obligation Policy: A mandated action with a work flow Refrain Policy: A prohibited action. Period. Although a Refrain Policy can be stated affirmatively as an Obligation Policy, including both in the same code system (e.g., all as Obligation Policy Codes) could lead to semantic conflicts if more than one instance of an Obligation Policy is permitted in a Composite Policy For example, an Obligation Policy requiring that disclosed information be encrypted would be incompatible with a Refrain Policy mandating that the information not be disclosed

Relation between Obligation and Refrain Policies An Obligation may stem from a Permitted Operation An Obligation may stem from a Refrain Policy on a Permitted Operation

Refrain CodesRefrain Definition NOAUTHProhibition on disclosure without information subject's authorization. NOCOLLECTProhibition on collection or storage of the information. NOINTEGRATEProhibition on Integration into other records. NOLLISTProhibition on disclosure except to individuals on specific access list. NOMOU Prohibition on disclosure without an interagency service agreement or memorandum of understanding (MOU) NOORGPOLProhibition on disclosure without organizational authorization. NOPERSIST Prohibition on collection of the information beyond time necessary to accomplish authorized purpose of use is prohibited. NOPROMISE Prohibition on disclosure to an external organization unless agreement to a specific obligation has been obtained. NOREDISCLOSEProhibition on disclosure without authorization under jurisdictional law. NORELINK Prohibition on associating de-identified or pseudonymized information with other information in a manner that could or does result in disclosing information intended to be masked. NORESTRICTIONProhibition on disclosure without organizational approved patient restriction. NOREUSE Prohibition on use of the information beyond the purpose of use initially authorized. NOVIP Prohibition on disclosure except to principals with access permission to specific VIP information. ORCONProhibition on disclosure except as permitted by the information originator. Possible Refrain Policy Type Codes

Added Directed Association between Obligation and Refrain