Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services Patrick C. K. HUNG Faculty of Business and Information Technology,

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Medicaid Management Information System (MMIS) Replacement
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Presented by the Office of the General Counsel An Overview of HIPAA.
NAU HIPAA Awareness Training
Are you ready for HIPPO??? Welcome to HIPAA
E-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong Dickson K. W. CHIU Senior Member,
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts Dickson K. W. CHIU Senior Member, IEEE Dickson Computer.
Travel and Expense Management Scenario Overview
Security Controls – What Works
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Web-service Based Human Resource Recruitment by Using Matchmaking Decision Support Dickson K. W. CHIU Senior Member, IEEE Dickson Computer Systems Hong.
Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture Dan Hong, SC Cheung, SMIEEE Department of.
Web-service Based Information Integration for e-Mortgage Contract Matchmaking Decision Support: A Case Study in Hong Kong Dickson K. W. CHIU Senior Member,
E-Monitoring of Outsourcing IS Project in Financial Institutions: A Case Study on Mandatory Provident Fund Projects in Hong Kong Vincent C.T. Chan Dept.
Collaborative Workflow Management with Alerts: An Integrated Retailing System for Garments Brands Donald S.F. Wong Department of Computing, Hong Kong Polytechnic.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Chapter 7 Database Auditing Models
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Internal Auditing and Outsourcing
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
Towards End-to-End Privacy Control in the Outsourcing of Marketing Activities: A Web Service Integration Patrick C. K. HungDickson K.W. Chiu W.W. FungWilliam.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Towards End-to-End Privacy Control in the Outsourcing of Marketing Activities: A Web Service Integration Patrick C. K. Hung Dickson K.W. Chiu W.W. Fung.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Encrypted from CDS Office Technologies
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Introduction to ONE Mail
Disability Services Agencies Briefing On HIPAA
Alerts for Healthcare Process and Data Integration
Employee Privacy and Privacy of Employee Information
Health Care: Privacy in a Digital Age
e-Invoicing – e-Ordering 20/11/2008
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
The Health Insurance Portability and Accountability Act
Presentation transcript:

Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services Patrick C. K. HUNG Faculty of Business and Information Technology, University of Ontario Institute of Technology Eleanna Kafeza Department of Marketing and Communications, Athens University of Economics and Business Dickson K. W. CHIU Senior Member, IEEE Dickson Computer Systems Hong Kong Vivying S.Y. Cheng Dept. of Computer Science Hong Kong University of Science & Technology

MIEPHICSS Introduction Medical images exist in electronic format for easy storage and maintenance promote high quality healthcare services for patients a picture is worth a thousand words Problem: uncontrolled exchange of medical images Human initiated: s, fax, ad hoc file transfer, … Software initiated or software-to-software Cross-institutional healthcare processes integration Health Insurance Portability and Accountability Act of 1996 (HIPAA) (1) Privacy, (2) Security, (3) Identifiers (4) Transactions and Code Sets rules cover PHI “in any form or medium”

MIEPHICSS Proposed Approach Medical Image Exchange Platform (MIEP) Layered approach Contemporary information technologies Web services for the information transport Role based access control (RBAC) Watermarking for the integrity and privacy protection Single-point border check

MIEPHICSS Protocol and Architecture Summary

MIEPHICSS Layered Architecture Audit Application Watermarked Images Ontology Web Services Secured transport Privacy + Access Control Rules Enterprise Process ProtectionPolicy and Rules Monitoring Medical Partner Internet SSL and PKI WSDL EPAL / P3P & APPEL Medical Partner OWL / DAML Watermarking Protocol BPEL Laws / Regulation / Standards Audit Application Watermarked Images Ontology Web Services Secured transport Privacy + Access Control Rules Enterprise Process ProtectionPolicy and Rules

MIEPHICSS Development Methodology - Overview Policies Rules Technical Auditing

MIEPHICSS Development Methodology - Policies Protection policies should comply with requirements in laws, regulations, and code of practices. Healthcare process integration should comply with the protection policies - privacy and access control requirements should be specified explicitly. Existing protection policy guarding internal operations may serve as basic hints for external partners.

MIEPHICSS Development Methodology - Rules RBAC for employees of internal and external parties Need-to-know principle - consider: the access need of each task of each process for each role sensitivity of the image content contingencies and necessary override mechanisms => avoid ad hoc decisions. Make sure that medical partners understand not only the protection policies but also the ontology based on which these rules are defined

MIEPHICSS Development Methodology - Technical Express these rules in a high level language such as EPAL, P3P, and APPEL. Ensure document images are exchanged via only the pre-defined MIEP Web service calls and from authenticated partners. Firewall and filters may be implemented to scan for and stop uncontrolled image traffic. Watermark (containing protection information) is inserted into each image sent or received via the MIEP Web services. Validation of document access against the access information embedded in the image watermark.

MIEPHICSS Development Methodology - Auditing Auditing application may use existing in-house software as a blue-print, but now stricter. Monitor actively all document image access to ensure security and privacy constraints are met the integrity of image data otherwise, alerts should be sent to the management.

MIEPHICSS MIEP Concept Model

MIEPHICSS Some Technical Details Outgoing Images Incoming Images Image Pickup Service Privacy Policies and Rules

MIEPHICSS Outgoing Images Routed through the outgoing proxy Web service SendDocumentImage (S) - parameters: destination Web service to receive the images, purpose, sender, and target information (such as task, application, personnel, and/or role), image format descriptions, … S calls the enterprise image exchange auditing Web service AuditSend Existing watermark (if any) analyzed for validity and protection policies sender & receiver are indeed legible the exchange does not violate any protection policies Watermark insertion: vital information such as the purpose, sender and target information (such as task, application, personnel, and/or role). Such transactions are logged.

MIEPHICSS Incoming Images Routed through the incoming proxy Web service ReceiveDocumentImage (R) - parameters: destination to receive the images (Web service URL, port and operation), the user id, purpose, sender and target information (such as task, application, personnel, and/or role), image format descriptions, … R call the enterprise image exchange auditing Web service AuditReceive for validation. Compliant watermark from partner’s MIEP (if any) can be extracted for addition validation. Similar watermark insertion for tracking. Such transactions are logged.

MIEPHICSS Image Pickup Service Not every business partner could immediately switch to a MIEP platform. Initially allow a “pick up” service to cater for manual retrieval of the image in case the partner is not fully automated. Used in a call back mode to further enhance the security for program-to-program interaction. Pre-registration required for auditing and protection.

MIEPHICSS Privacy Policies and Rules P3P - user agents allow users to automatically be informed of site practices and to facilitate decision-making based on the Web sites’ privacy practices. APPEL for expressing users’ preferences of making automated or semi-automated decisions regarding the acceptability of machine- readable privacy policies from P3P enabled Web sites. Matching mechanism A’s preferences (in APPEL) of vs. B’s P3P policies in Step 1.

MIEPHICSS Validation with HIPAA rules The right to view and make a copy of a patients own medical records, and the right to request PHI to be shared with the patient in a particular way. Patients can readily request their own medical images through the MIEP image pick up services The right to find out where PHI has been shared for purposes other than care, payment, or healthcare operations MIEP tracks and logs all cross-institutional exchange of medical image. The right to request special restrictions on the use or disclosure of PHI. MIEP maintains the patients’ profiles regarding their privacy preferences The right to file complaints. MIEP can provide exchange records and evidence.

MIEPHICSS Summary Replace ad hoc and manual image exchange procedures with a unified Medical Image Exchange Platform (MIEP) Layered MIEP architecture Design and implementation methodology Image exchange protocol Application of Web services and watermarking technologies Embedded watermark ensure integrity, privacy, and access control Advantages of Web service / SOA Legacy systems and existing practices corrected with MIEP Reusability of MIEP => streamlines the development, deployment, and maintenance of software components for image exchange Single border check for all the protection policies and auditing procedures => adequate control and auditing Expandability For future tracking and auditing purposes

MIEPHICSS Future Work  Exploration of any potential usability and performance issues.  Mechanisms and tools for managing the interactions taking place between different layers in the proposed framework.  Further requirements engineering for privacy and security.  Application of ontologies  role classifications  terms used to present a domain of knowledge  Representation of the privacy access control policy in EPAL and the compliance of EPAL to the Web services.  Adoption issues  Application in other professional business domains: financial, legal …

MIEPHICSS Question and Answer Thank you! Contact:

MIEPHICSS An Illustrative APPEL Privacy Preference … … …...

MIEPHICSS An Illustrative P3P Privacy Policy