Li Xiong
CS573 Data Privacy and Security
Healthcare privacy and security Li Xiong CS573 Data Privacy and - - PowerPoint PPT Presentation
Healthcare privacy and security Li Xiong CS573 Data Privacy and Security Patients Are Concerned Did you know... 77 percent of all Americans feel their personal health information privacy is very important, and 84 percent said they
CS573 Data Privacy and Security
77 percent of all Americans feel
their personal health information privacy is very important, and
84 percent said they were very
concerned or somewhat concerned that personal health information might be made available to others without their consent.
Only 7 percent said they are
willing to store or transmit personal health information on the Internet, and only 8 percent felt a Web site could be trusted with such information.
90 percent said they would trust their doctor to
Only 42 percent said they would trust an insurance
Health Insurance
Federal Privacy
rights to privacy of their health information
5
Sets standards and requirements for maintenance and
electronic transmission of patient health information
Covers 4 areas
Privacy of information Security of data Transactions and code set standards for electronic
transactions
Identifiers for providers, employers, and payers
Health Plans, including health insurance companies, HMOs, company
health plans, and certain government programs that pay for health care, such as Medicare and Medicaid.
Most Health Care Providers - those that conduct certain business
electronically, such as electronically billing your health insurance including most doctors, clinics, hospitals, psychologists, chiropractors, nursing homes, pharmacies, and dentists.
Health Care Clearinghouses - entities that process nonstandard health
information they receive from another entity into a standard (i.e., standard electronic format or data content), or vice versa.
7
Is created or received by a provider, plan,
Relates to past, present or future physical
Applies to physical, technical and administrative requirements to protect maintenance, availability and confidentiality of PHI
Closely intertwined with Privacy Rule
Requires appropriate technological measures and physical security safeguards to maintain the security of PHI
Will require Policies and Procedures and training for:
Password Maintenance
Access Controls
Physical Controls
E-Mail Risks Other
9
Claims Remittances COB Eligibility Referral Certification Claim Status Enrollment Premiums
Standard Codes Minimum data sets
10
Q: How many things do you sign when you go to
Q: Do you know what they say? Q: Do you really have a choice to not sign then?
Also allows HHS to view your medical records
by a formal determination by a qualified
Removal of certain identifiers (i.e., safe harbor
Treatment Operations Payment Operations Health Care Operations
Ex: Directory of patients Ex: Notifications
Family Members Pharmacies Law Enforcement (disaster relief, epidemic, etc)
Disclosure as a result of a previous disclosure
Public Health (prevention or containment of a
Employees where transmission of a
Victims of abuse, neglect, violence, etc Heath oversight activates and judicial
Law enforcement purposes Decedents Organ, eye, tissue donations Research purposes Serious threat to public safety … and more…
Names; Postal address information, other than town or city,
State and zip; Telephone numbers, Fax numbers; Electronic mail addresses; Social security numbers; Medical record numbers; Health plan beneficiary numbers; Account numbers; Certificate/license numbers; Vehicle identifiers and serial numbers, including license plate numbers; Device identifiers and serial numbers; Web Universal Resource Locators (URLs); Internet Protocol (IP) address numbers; Biometric identifiers, including finger and voice prints; Full face photographic images and any comparable images.
Health care providers for treatment Individuals who is the subject of the
Disclosures made pursuant to an authorization Disclosure to HHS or required by law Disclosure for HIPAA compliance reviews
Access or inspect their health record Obtain a copy from their healthcare provider
Access and copying for as long as information
There are a few exceptions
May need to put request
Organization will review
Request for amendment
A list of disclosures (releases) within past six
Exceptions: treatment, payment healthcare
Can request restriction in use of information
Organization is not required to agree with
Individual within the
The Secretary of the
Notice describes
How medical information is used and disclosed
How to access and obtain a copy of their medical
A summary of patient rights under HIPAA How to file a complaint, and contact information
Failure to comply with HIPAA requirements Knowingly or wrongfully disclosing or
Obtaining information with intent to:
$100 per failure to comply with a Privacy Rule
Any person (a physical person or an
Up to a $50,000 fine Up to a one-year prison term
An intention to sell, transfer, or use PHI
33
34
HIPAA Applicability Scope Tied to Administrative Transactions
Other provider organizations that do not participate in administrative
transactions are not required to comply with HIPAA Privacy and Security Rules
Need to address all organizations that collect, receive, maintain, or
use individually identifiable health information Inconsistent Applicability of Privacy and Security Rules
Privacy Rule applies to all individually identifiable health information Security Rule applies only to electronic health information Both need to apply to all identifiable health information, with
appropriate provisions for electronic and non-electronic media
Lack definition Public notification may encourage others to exploit
vulnerabilities
How to measure severity, intention, potential harm
Consumer has right to know who has accessed his or her
health information
Health information may be released without patient’s consent
for purposes of treatment, payment, and “healthcare
Need to constrain definition of “healthcare operations”
Determining “Minimum Necessary”
Need to allow for context specificity
“De-identification” of Health Information
Consumers with less common conditions, and consumers in sparsely populated areas are at higher risk of re-identification
Moving target – as systems become faster and more interconnected, “de- identification” becomes less feasible
In some cases, the ability to “re-link” health information to an individual is beneficial to the health and safety of that individual
Sale of Health Information
Who owns the information – and therefore stands to profit from its sale?
Is ownership permanently bound with the individual about whom the information originally was collected? In other words, can ownership change
Is an individual’s authorization required in order to sell his or her health information?
Extraction of identifying information Removal or masking of the identifying
Privacy Model Conceptual Framework Attribute Extraction Anonymization
all of the HIPAA identifiers (direct and indirect)
All of the direct HIPAA identifiers are removed but
Maintain useful information while guaranteeing
and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000.
date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older;
assigned by the investigator to code the data)
tagging software which can be used to tag data
a CRF-based classifier a set of data preprocessing and postprocessing
We use an iterative process for classifying and
Using 100 hand-tagged pathology reports from the
Precision is the number of correctly labeled identifying
Recall is the number of correctly labeled identifying
Query precision