NHS e-Lab Nottingham, September 2010 John Ainsworth

Slides:



Advertisements
Similar presentations
Grid Security/Edinburgh 5 th & 6 th December 2002 Confidentiality, Consent & Access Peter Singleton - Cambridge Health Informatics.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
ICIS-NPDES Plugin Design Preview Webinar ICIS-NPDES Full Batch OpenNode2 Plugin Project Presented by Bill Rensmith Windsor Solutions, Inc. 3/15/2012.
Agenda Problem Existing Approaches The e-Lab Is DRM the solution?
Information Governance Peter McKenzie Information Governance Manager NHS Tayside
Components of GIS.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 8 Application Data Auditing.
Bringing HIPAA to Hospital Systems HIPAA impact on hospital systems viaMD solution for HIPAA compliance W e b e n a b l i n g Pa t i e n t A d m i t t.
Presentation #15 Prescription Drug Storage and Inventory.
Data Linkage Service Garry Coleman, Health and Social Care Information Centre.
Relational Database Alternatives NoSQL. Choosing A Data Model Relational database underpin legacy applications and meet business needs However, companies.
Systematic Review Data Repository (SRDR™) The Systematic Review Data Repository (SRDR™) was developed by the Tufts Evidence-based Practice Center (EPC),
Massachusetts: Transforming the Healthcare Economy John D. Halamka MD CIO, Harvard Medical School and Beth Israel Deaconess Medical Center.
Information Security Policies and Standards
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
Systems Analysis and Design in a Changing World, 6th Edition
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Chapter Physical Database Design Methodology Software & Hardware Mapping Logical Design to DBMS Physical Implementation Security Implementation Monitoring.
“NHS South Central – Improving health and alleviating the causes of poor health for the benefit of patients, the public and taxpayer alike in Oxfordshire,
Key Health Data Launch The Role of the CBSA September 08.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
A Primer on Healthcare Information Exchange John D. Halamka MD CIO, Harvard Medical School and Beth Israel Deaconess Medical Center.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
Functions of a Database Management System. Functions of a DBMS C.J. Date n Indexing n Views n Security n Integrity n Concurrency n Backup/Recovery n Design.
PMI Inventory Tracker™
John Perry MIRC Overview Medical Imaging Resource Center MIRC Overview Medical Imaging Resource Center.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Open Data Platform Supplier Forum 13 January 2012.
1.View Description 2.Primary Presentation 3.Element Catalog Elements and Their Properties Relations and Their Properties Element Interfaces Element Behavior.
1 Adapted from Pearson Prentice Hall Adapted form James A. Senn’s Information Technology, 3 rd Edition Chapter 7 Enterprise Databases and Data Warehouses.
SPIRE Project Scottish Primary Care Information Resource SCIMP Conference 2013.
Additional Security Tools Lesson 15. Skills Matrix.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
YOUR HEALTH: YOUR RECORDS, YOUR CHOICE 24 th April 2013.
DAY 14: MICROSOFT ACCESS – CHAPTER 1 Madhuri Siddula October 1, 2015.
09/02 ID099-1 September 9, 2002Grid Technology Panel Patrick Dreher Technical Panel Discussion: Progress in Developing a Web Services Data Analysis Grid.
Hampshire Health Record Diabetes pathway reports.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 3: Data Management Systems.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Relational Databases. Relational database  data stored in tables  must put data into the correct tables  define relationship between tables  primary.
Create Content Capture Content Review Content Edit Content Version Content Version Content Translate Content Translate Content Format Content Transform.
Funded by: © AHDS Preservation in Institutional Repositories Preliminary conclusions of the SHERPA DP project Gareth Knight Digital Preservation Officer.
Application Development
National Programme for Information Technology The Secondary Uses Service Jeremy Thorp Director of Business Requirements Technology Office.
PACS Progress Update NWWM Cluster Rhidian Bramley PACS & Teleradiology SIG BIR, London 2005.
Hertfordshire Partnership NHS Foundation Trust Quality and Safety Jonathan Wells Head of Practice Governance July 2010.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
DATABASE CONTROLS Chapter 14. Access Controls Discretionary Access Controls Discretionary Access Controls Types of Restrictions : 1. Name-dependent restrictions.
TBD. Comprehensive Data Set “Integrated” Model (Data is “integrated” in Common Data Base using PHI and “rests” in encrypted formats) “Merged” Model (Data.
Health Information Exchange: Alaska’s Health Pipeline Alaska Bar Association Health Law Section February 2, 2012 Carolyn Heyman-Layne.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. REDCap:
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
REDCap General Overview
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
The Role of LIMS in Improving Laboratory services at NPHL, Kenya
Streamline your HR document management processes
Functions of a Database Management System
Security and Encryption
Offline Auditing for Privacy
Final HIPAA Security Rule
Keeping Member Data Safe
Distributed medical databases
Bill Yau HKU Grid Certificate Authority (HKU Grid CA) Self Audit & Status Report Bill Yau
Basic Data Provenance April 22, 2019
Module 2.1 Facilities Management
Presentation transcript:

NHS e-Lab Nottingham, September 2010 John Ainsworth

Our Approach Enforce information governance through technology wherever possible Designed for minimum data release Only release items that user “Needs to know” NHS is in control of data at all times; NHS can choose what to make available through the e- Lab Data is stored in a repository hosted on a server inside the NHS Trust

Information Governance Technical safeguards – Access Control based on privileges – Audit trails & monitoring – Anonymisation and Inference control Operational – Users sign up to terms and conditions of use; bound by employment contracts – Auditing of users – Standard Operating Procedures Governance Board + NRES Research Database Approval

NHS Trust E-Lab Pseudonymised Data Repository Governance Users EHR

Clinical Data Non-clinical Data Clinical Data Integrated EHR Pseudonymised Data Repository Non-clinical Data 2. Pseudonymisation 1. Integration of primary and secondary care records Trust Systems Trust e-Lab

User Data Store 4. Anonymisation and inference control 5. Storage 6. Data analysis and visualization Access Control e-Lab Tools 1.User logs on and submits query 2. Access control module authorizes request 3. Perform Data Query Psuedonymised Repository Trust e-Lab

Data Extraction Copies data from one database to another Performs transformations on data fields e.g. – Postcode => LLSOA – Postcode => Area – Date = > year – Date => year and quartile – * => SHA-1 + user defined salt – * => RSA public-private key encryption – * => random 32-bit integer Plug-in architecture for transformers

Pseudonymisation

Data Extraction