Security Methods for Statistical Databases. Introduction  Statistical Databases containing medical information are often used for research  Some of.

Slides:



Advertisements
Similar presentations
Presented by Elena Chan, UCSF Pharm.D. Candidate Tiffany Jew, USC Pharm.D. Candidate March 14, 2007 P HARMACEUTICAL C ONSULTANTS, I NC. P RO P HARMA HIPAA.
Advertisements

HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Confidentiality and HIPAA
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
HIPAA Health Insurance Portability and Accountability Act.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Presented by the Office of the General Counsel An Overview of HIPAA.
Westbrook Technologies from Document Management’s Role in HIPAA.
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
 Original Intent: ◦ Act passed in 1996 with two main goals: 1.Ensure individuals would be able to maintain their health insurance between jobs (the “portability”
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
Privacy, Security, Confidentiality, and Legal Issues
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Statistical database security Special purpose: used only for statistical computations. General purpose: used with normal queries (and updates) as well.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Privacy & Personal Information -- Why do we care or do we?
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA Health Insurance Portability & Accountability Act of 1996.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Patient Record System Team A DBM/381 February 4, 2013 John Italiano.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Michael R. Costa, Esq., M.P.H. Greenberg Traurig, LLP One International Place, 3 rd Floor Boston, MA (fax)
Introduction to: 1.  Goal[DEN83]:  Provide frequency, average, other statistics of persons  Challenge:  Preserving privacy[DEN83]  Interaction between.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Security Control Methods for Statistical Database Li Xiong CS573 Data Privacy and Security.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Health Insurance portability and Accountability Act (HIPAA)‏
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Training Workshop #1 Council of Community Clinics – San Diego February 7, 2003 by Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA A Sea of Confusion, A Wave of the future and A High Tide of Confidentiality.
HIPAA HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
HIPAA Yesterday, Today and Tomorrow? Dianne S. Faup Office of HIPAA Standards Centers for Medicare & Medicaid Services.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Understanding HIPAA Dr. Jennifer Lu.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Introduction to the PACS Security
Presentation transcript:

Security Methods for Statistical Databases

Introduction  Statistical Databases containing medical information are often used for research  Some of the data is protected by laws to help protect the privacy of the patient  Proper security precautions must be implemented to comply with laws and respect the sensitivity of the data

Accuracy vs. Confidentiality Accuracy – Researchers want to extract accurate and meaningful data Confidentiality – Patients, laws and database administrators want to maintain the privacy of patients and the confidentiality of their information

Laws  Health Insurance Portability and Accountability Act – HIPAA (Privacy Rule)  Covered organizations must comply by April 14, 2003  Designed to improve efficiency of healthcare system by using electronic exchange of data and maintaining security  Covered entities (health plans, healthcare clearinghouses, healthcare providers) may not use or disclose protected information except as permitted or required  Privacy Rule establishes a “minimum necessary standard” for the purpose of making covered entities evaluate their current regulations and security precautions

HIPAA Compliance  Companies offer 3 rd Party Certification of covered entities  Such companies will check your company and associating companies for compliance with HIPAA  Can help with rapid implementation and compliance to HIPAA regulations

Types of Statistical Databases  Static – a static database is made once and never changes  Example: U.S. Census  Dynamic – changes continuously to reflect real-time data  Example: most online research databases

Security Methods  Access Restriction  Query Set Restriction  Microaggregation  Data Perturbation  Output Perturbation  Auditing  Random Sampling

Access Restriction  Databases normally have different access levels for different types of users  User ID and passwords are the most common methods for restricting access  In a medical database:  Doctors/Healthcare Representative – full access to information  Researchers – only access to partial information (e.g. aggregate information)

Query Set Restriction  A query-set size control can limit the number of records that must be in the result set  Allows the query results to be displayed only if the size of the query set satisfies the condition  Setting a minimum query-set size can help protect against the disclosure of individual data

Query Set Restriction  Let K represents the minimum number or records to be present for the query set  Let R represents the size of the query set  The query set can only be displayed if K  R

Query Set Restriction

Microaggregation  Raw (individual) data is grouped into small aggregates before publication  The average value of the group replaces each value of the individual  Data with the most similarities are grouped together to maintain data accuracy  Helps to prevent disclosure of individual data

Microaggregation  National Agricultural Statistics Service (NASS) publishes data about farms  To protect against data disclosure, data is only released at the county level  Farms in each county are averaged together to maintain as much purity, yet still protect against disclosure

Microaggregation

Data Perturbation  Perturbed data is raw data with noise added  Pro: With perturbed databases, if unauthorized data is accessed, the true value is not disclosed  Con: Data perturbation runs the risk of presenting biased data

Data Perturbation

Output Perturbation  Instead of the raw data being transformed as in Data Perturbation, only the output or query results are perturbed  The bias problem is less severe than with data perturbation

Output Perturbation Query Results

Auditing  Auditing is the process of keeping track of all queries made by each user  Usually done with up-to-date logs  Each time a user issues a query, the log is checked to see if the user is querying the database maliciously

Random Sampling  Only a sample of the records meeting the requirements of the query are shown  Must maintain consistency by giving exact same results to the same query  Weakness - Logical equivalent queries can result in a different query set

Comparison Methods  Security  Security – possibility of exact disclosure, partial disclosure, robustness  Richness of Information  Richness of Information – amount of non-confidential information eliminated, bias, precision, consistency  Costs  Costs – initial implementation cost, processing overhead per query, user education The following criteria are used to determine the most effective methods of statistical database security:

A Comparison of MethodsMethodSecurity Richness of Information Costs Query-set Restriction Low Low 1 Low MicroaggregationModerateModerateModerate Data Perturbation HighHigh-ModerateLow Output Perturbation ModerateModerate-lowLow AuditingModerate-LowModerateHigh SamplingModerateModerate-LowModerate 1 Quality is low because a lot of information can be eliminated if the query does not meet the requirements

Sources  This presentation is posted on  Adam, Nabil R. ; Wortmann, John C.; Security- Control Methods for Statistical Databases: A Comparative Study; ACM Computing Surveys, Vol. 21, No. 4, December 1989 ( adam.pdf?key1=76895&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN= ) adam.pdf?key1=76895&key2= &coll=portal&dl=ACM&CFID= &CFTOKEN=  Official HIPAA – ( incurhttp://cms.hhs.gov/hipaa/  Bernstein, Stephen W.; Impact of HIPAA on BioTech/Pharma Research: Rules of the Road (  Service Bureau; 3rd Party Testing (