experiences in the logical specification of the hipaa and ...€¦ · i formalization e orts have...

91
Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws Henry DeYoung Deepak Garg Limin Jia Dilsun Kaynar Anupam Datta Carnegie Mellon University Workshop on Privacy in the Electronic Society October 4, 2010

Upload: others

Post on 14-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Experiences in the Logical Specification ofthe HIPAA and GLBA Privacy Laws

Henry DeYoung Deepak Garg Limin JiaDilsun Kaynar Anupam Datta

Carnegie Mellon University

Workshop on Privacy in the Electronic SocietyOctober 4, 2010

Page 2: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Making sense of real privacy laws

Observation: Real privacy laws are complex.I Examples:

I Health Insurance Portability and Accountability Act (HIPAA)I Gramm-Leach-Bliley Act (GLBA)

I Long, dense — HIPAA Privacy Rule has 84 operationalclauses for transmissions on ∼30 pages

I Too complex to be a practical day-to-day guide.

Desiderata: Interactive tools for enforcement and analysis

I “Does GLBA permit Bank X to disclose Bob’s infoto Charlie?”

I “Are Hospital Y ’s policies consistent with HIPAA?”

Page 3: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Making sense of real privacy laws

Observation: Real privacy laws are complex.I Examples:

I Health Insurance Portability and Accountability Act (HIPAA)I Gramm-Leach-Bliley Act (GLBA)

I Long, dense — HIPAA Privacy Rule has 84 operationalclauses for transmissions on ∼30 pages

I Too complex to be a practical day-to-day guide.

Desiderata: Interactive tools for enforcement and analysis

I “Does GLBA permit Bank X to disclose Bob’s infoto Charlie?”

I “Are Hospital Y ’s policies consistent with HIPAA?”

Page 4: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Making sense of real privacy laws

Prior work:I Logics and languages for specification of privacy policies

I P3P [Cranor et al.], XACML [OASIS], EPAL [Backes et al.],requirements engineering [Breaux and Anton],LPU [Barth et al.], Privacy APIs [Gunter et al.],deontic logic [I. Lee et al.], SecPAL [Becker et al.], ...

I Formal specification of privacy lawsI LPU [Barth et al.]: Examples from HIPAA and GLBAI Datalog HIPAA [Lam et al.]: HIPAA §§164.502, 506, and 510I Privacy APIs [Gunter et al.]: HIPAA §164.506I Deontic logic [I. Lee et al.]: Examples from FDA CFR §610.40

Problem:

I Formalization efforts have not covered full privacy laws.

I Do these techniques scale to specification andcomputer-assisted enforcement of full privacy laws?

Page 5: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Making sense of real privacy laws

Prior work:I Logics and languages for specification of privacy policies

I P3P [Cranor et al.], XACML [OASIS], EPAL [Backes et al.],requirements engineering [Breaux and Anton],LPU [Barth et al.], Privacy APIs [Gunter et al.],deontic logic [I. Lee et al.], SecPAL [Becker et al.], ...

I Formal specification of privacy lawsI LPU [Barth et al.]: Examples from HIPAA and GLBAI Datalog HIPAA [Lam et al.]: HIPAA §§164.502, 506, and 510I Privacy APIs [Gunter et al.]: HIPAA §164.506I Deontic logic [I. Lee et al.]: Examples from FDA CFR §610.40

Problem:

I Formalization efforts have not covered full privacy laws.

I Do these techniques scale to specification andcomputer-assisted enforcement of full privacy laws?

Page 6: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Making sense of real privacy laws

Prior work:I Logics and languages for specification of privacy policies

I P3P [Cranor et al.], XACML [OASIS], EPAL [Backes et al.],requirements engineering [Breaux and Anton],LPU [Barth et al.], Privacy APIs [Gunter et al.],deontic logic [I. Lee et al.], SecPAL [Becker et al.], ...

I Formal specification of privacy lawsI LPU [Barth et al.]: Examples from HIPAA and GLBAI Datalog HIPAA [Lam et al.]: HIPAA §§164.502, 506, and 510I Privacy APIs [Gunter et al.]: HIPAA §164.506I Deontic logic [I. Lee et al.]: Examples from FDA CFR §610.40

Problem:

I Formalization efforts have not covered full privacy laws.

I Do these techniques scale to specification andcomputer-assisted enforcement of full privacy laws?

Page 7: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 8: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 9: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 10: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 11: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 12: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Our work

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy laws

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Builds on the Logic of Privacy and Utility (LPU) [Barth et al.],a logical formalization of contextual integrity [Nissenbaum].

Page 13: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 14: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 15: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 16: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 17: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 18: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 19: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Transmission of protected information

p1 p2

Sender Recipient

msg(subject, info)

msg(Bob, phi)

m q t

Page 20: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Transmission of protected information

p1 p2

Sender Recipient

msg(subject, info)

msg(Bob, phi)

m

q t

Page 21: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Transmission of protected information

p1 p2

Sender Recipient

msg(subject, info)

msg(Bob, phi)

m q

t

Page 22: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Transmission of protected information

p1 p2

Sender Recipient

msg(subject, info)

msg(Bob, phi)

m q t

Page 23: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Transmission of protected information

p1 p2

Alice Charlie

msg(subject, info)

msg(Bob, phi)

m q t

Page 24: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 25: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 26: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 27: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 28: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 29: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 30: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Norms of transmission in privacy laws

Positive norms, ϕ+i : Transmission may occur if condition is

satisfied.

I “A covered entity may disclose protected health informationfor treatment activities [...].” [HIPAA §164.506(c)(2)]

Negative norms, ϕ−j : Condition must be satisified if transmissionoccurs.

I “A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes.” [HIPAA §164.508(a)(2)]

A transmission is lawful if and only if it satisfies at least one of thelaw’s positive norms and all of the law’s negative norms.

maysend(p1, p2,m) ,(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 31: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 32: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 33: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 34: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 35: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 36: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 37: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 38: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Exceptions refine norms of transmission

Exceptions to negative norms:“A covered entity must obtain an authorization for any use ordisclosure of psychotherapy notes, except [...].”

Conclusion: Satisfy either the core or one of the exceptions.

ϕ−164.508a2′ , ϕ−164.508a2 ∨ (ϕe

164.508a2iA ∨ · · · )

“Exceptions” to positive norms:

I A covered entity may disclose information to report abuse.

I Disclosures under previous require informing the victim.

Conclusion: Satisfy the core and its refinements.

ϕ+164.512c1′ , ϕ+

164.512c1 ∧ ϕe164.512c2

Page 39: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Structure of HIPAA and GLBA privacy laws

Health Insurance Portability and Accountability Act:I Primarily positive norms

I 56 positive norms, 7 negative norms, and 19 exceptionsI Negative norms for patient consent or opt-out opportunity

(§§164.508 and 164.510)

I Deny all transmissions not explicitly allowed

Gramm-Leach-Bliley Act:I No positive norms

I 5 negative norms and 10 exceptionsI Negative norms require notices and opt-out opportunities

(§§6802 and 6803)

I Allow all transmissions not explicitly denied

Page 40: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Structure of HIPAA and GLBA privacy laws

Health Insurance Portability and Accountability Act:I Primarily positive norms

I 56 positive norms, 7 negative norms, and 19 exceptionsI Negative norms for patient consent or opt-out opportunity

(§§164.508 and 164.510)

I Deny all transmissions not explicitly allowed

Gramm-Leach-Bliley Act:I No positive norms

I 5 negative norms and 10 exceptionsI Negative norms require notices and opt-out opportunities

(§§6802 and 6803)

I Allow all transmissions not explicitly denied

Page 41: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 42: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 43: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Purposes of disclosures

HIPAA §164.506(c)(2)

“A covered entity may disclose protected health informationfor [the purpose of] treatment activities of a health care provider.”

Conclusion: Purpose constants and ∈U predicate for subpurposehierarchy

I (blood-tests ∈U treatment) because blood tests are a type oftreatment.

ϕ+164.506c2 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧(u ∈U treatment(p2)) ∧activerole(p2, provider)

Page 44: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Purposes of disclosures

HIPAA §164.506(c)(2)

“A covered entity may disclose protected health informationfor [the purpose of] treatment activities of a health care provider.”

Conclusion: Purpose constants and ∈U predicate for subpurposehierarchy

I (blood-tests ∈U treatment) because blood tests are a type oftreatment.

ϕ+164.506c2 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧(u ∈U treatment(p2)) ∧activerole(p2, provider)

Page 45: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Purposes of disclosures

HIPAA §164.506(c)(2)

“A covered entity may disclose protected health informationfor [the purpose of] treatment activities of a health care provider.”

Conclusion: Purpose constants and ∈U predicate for subpurposehierarchy

I (blood-tests ∈U treatment) because blood tests are a type oftreatment.

ϕ+164.506c2 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧(u ∈U treatment(p2)) ∧activerole(p2, provider)

Page 46: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Principals’ beliefs and professional judgement

HIPAA §164.512(f)(4)

“A covered entity may disclose protected health information aboutan individual who has died to a law enforcement official for thepurpose of alerting law enforcement if the covered entity has asuspicion that the death may have resulted from criminal conduct.”

Conclusion: Include uninterpreted believes-. . . predicates

ϕ+164.512f4 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧belongstorole(q, deceased) ∧activerole(p2, law-enforcement-official) ∧(u ∈U death-notification(q)) ∧believes-death-may-be-result-of-crime(p1, q)

Page 47: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Principals’ beliefs and professional judgement

HIPAA §164.512(f)(4)

“A covered entity may disclose protected health information aboutan individual who has died to a law enforcement official for thepurpose of alerting law enforcement if the covered entity has asuspicion that the death may have resulted from criminal conduct.”

Conclusion: Include uninterpreted believes-. . . predicates

ϕ+164.512f4 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧belongstorole(q, deceased) ∧activerole(p2, law-enforcement-official) ∧(u ∈U death-notification(q)) ∧believes-death-may-be-result-of-crime(p1, q)

Page 48: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Principals’ beliefs and professional judgement

HIPAA §164.512(f)(4)

“A covered entity may disclose protected health information aboutan individual who has died to a law enforcement official for thepurpose of alerting law enforcement if the covered entity has asuspicion that the death may have resulted from criminal conduct.”

Conclusion: Include uninterpreted believes-. . . predicates

ϕ+164.512f4 , activerole(p1, covered-entity) ∧

(t ∈T phi) ∧belongstorole(q, deceased) ∧activerole(p2, law-enforcement-official) ∧(u ∈U death-notification(q)) ∧believes-death-may-be-result-of-crime(p1, q)

Page 49: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 50: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Principals’ dynamic roles

Observation: Principals’ roles are dynamic.

I Principals enter and exit customer relationships with banks.

I Principals are active in other roles (e.g., doctor) duringcustomer relationship.

Conclusion: Distinguish the roles held from the active role.

I belongstorole(Alice, customer(X )): Alice is a customer of X .

I belongstorole(Alice, doctor(Bob): Alice is Bob’s doctor.

I activerole(Alice, doctor(Bob)): Alice is currently activeas Bob’s doctor.

I ¬activerole(Alice, customer(X )): Alice is not currently activeas a customer of X .

Page 51: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Principals’ dynamic roles

Observation: Principals’ roles are dynamic.

I Principals enter and exit customer relationships with banks.

I Principals are active in other roles (e.g., doctor) duringcustomer relationship.

Conclusion: Distinguish the roles held from the active role.

I belongstorole(Alice, customer(X )): Alice is a customer of X .

I belongstorole(Alice, doctor(Bob): Alice is Bob’s doctor.

I activerole(Alice, doctor(Bob)): Alice is currently activeas Bob’s doctor.

I ¬activerole(Alice, customer(X )): Alice is not currently activeas a customer of X .

Page 52: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 53: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 54: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 55: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 56: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 57: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

GLBA §6803(a)

“At the time of establishing a customer relationship and not lessthan annually during such relationship, a financial institution shallprovide a disclosure to such customer, of such institution’s policiesand practices with respect to [disclosing nonpublic personal info].”

Conclusion: Borrow operators from temporal logic and TPTL.

I Qφ: “φ is true at some past time.”

I 1φ: “φ is true at some future time.”

I ↓x . φ: Use x as a name for the current time in φ.

Page 58: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Past and future temporal requirements

GLBA §6802(b)(1)

“A financial institution may not disclose nonpublic personalinformation unless the consumer is given the opportunity to[opt-out], before the time that such information is disclosed.”

ϕ−6802b1 , activerole(p1, institution) ∧(t ∈T npi) ∧¬activerole(p2, affiliate(p1)) ∧belongstorole(q, consumer(p1))→↓x .Q(↓y . (x − y ≥ 14) ∧

∃m′. send(p1, q,m′) ∧

is-notice-of-potential-disclosure(m′, p1, p2, (q, t), u))

Page 59: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 60: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 61: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 62: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 63: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 64: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Page 65: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Self-referential because definition of lawful transmissions relies onthe lawfulness of a hypothetical disclosure.

Page 66: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement Features with syntax only Features with semantics

Self-referential legal clauses

§6802(c) of GLBA

“A nonaffiliated third party that receives nonpublic personalinformation from a financial institution shall not disclose suchinformation to any other person, unless such disclosure would belawful if made directly to such other person by the institution.”

i p1 p2

Institution Nonaffiliate Nonaffiliate

?

?

Conclusion: Use recursion (fixed points) to model self-reference.

ν maysend (p1, p2,m).(∨

i

ϕ+i

)∧(∧

j

ϕ−j

)

Page 67: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 68: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution Nonaffiliate

Nonaffiliate

Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 69: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution Nonaffiliate

Nonaffiliate

Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 70: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution

Nonaffiliate

Nonaffiliate Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)

?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 71: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution Nonaffiliate

Nonaffiliate

Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)

?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 72: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution Nonaffiliate

Nonaffiliate

Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)

?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 73: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

GLBA §6802(c) has short range of limits on redisclosure

Consider the scenario:

i p0 p1 p2

Institution Nonaffiliate

Nonaffiliate

Nonaffiliate Nonaffiliate

§6802(c)

§6802(c)

?

!

This does not seem in the spirit of GLBA §6802(c)!

Solution: Demand that the information’s origin could legally sendthe information directly.

Note: Discussion of other ambiguities can be found in the paper.

Page 74: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 75: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Properties of enforcement

Observations:

Enforcement by execution-time access control alone isinsufficient.

I Purposes, beliefs, future obligations, etc. are not, a priori,mechanically decidable.

I Cannot always demand human involvement at executiontime (e.g., medical emergency)

Enforcement must be:

1. execution-time access control mechanisms that mayoptimistically resolve undecidable predicates, postponingthem to

2. post-hoc audit with human involvement.

Goal: Devise decision procedures for predicates that seemmechanically undecidable.

Page 76: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Properties of enforcement

Observations:

Enforcement by execution-time access control alone isinsufficient.

I Purposes, beliefs, future obligations, etc. are not, a priori,mechanically decidable.

I Cannot always demand human involvement at executiontime (e.g., medical emergency)

Enforcement must be:

1. execution-time access control mechanisms that mayoptimistically resolve undecidable predicates, postponingthem to

2. post-hoc audit with human involvement.

Goal: Devise decision procedures for predicates that seemmechanically undecidable.

Page 77: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Properties of enforcement

Observations:

Enforcement by execution-time access control alone isinsufficient.

I Purposes, beliefs, future obligations, etc. are not, a priori,mechanically decidable.

I Cannot always demand human involvement at executiontime (e.g., medical emergency)

Enforcement must be:

1. execution-time access control mechanisms that mayoptimistically resolve undecidable predicates, postponingthem to

2. post-hoc audit with human involvement.

Goal: Devise decision procedures for predicates that seemmechanically undecidable.

Page 78: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Two decision procedures:

1. Standardized data formatsI Have lawyers draft a single annual notice so that the truth of

is-annual-notice is determined en masse for all customers.

2. Design-time analysis of business processesI (u ∈U directory) can be guaranteed true if information kiosk

responds only to directory requests.

Privacy Law

Audit Effort Example GLBA HIPAA

None Decision procedures 8 of 15 17 of 84

Small, non-expert prevent-fraud purpose 12 of 15 47 of 84Large, expert Beliefs, compliance 15 of 15 84 of 84

with other laws

Page 79: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Two decision procedures:

1. Standardized data formatsI Have lawyers draft a single annual notice so that the truth of

is-annual-notice is determined en masse for all customers.

2. Design-time analysis of business processesI (u ∈U directory) can be guaranteed true if information kiosk

responds only to directory requests.

Privacy Law

Audit Effort Example GLBA HIPAA

None Decision procedures 8 of 15 17 of 84

Small, non-expert prevent-fraud purpose 12 of 15 47 of 84Large, expert Beliefs, compliance 15 of 15 84 of 84

with other laws

Page 80: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Two decision procedures:

1. Standardized data formatsI Have lawyers draft a single annual notice so that the truth of

is-annual-notice is determined en masse for all customers.

2. Design-time analysis of business processesI (u ∈U directory) can be guaranteed true if information kiosk

responds only to directory requests.

Privacy Law

Audit Effort Example GLBA HIPAA

None Decision procedures 8 of 15 17 of 84

Small, non-expert prevent-fraud purpose 12 of 15 47 of 84Large, expert Beliefs, compliance 15 of 15 84 of 84

with other laws

Page 81: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Two decision procedures:

1. Standardized data formatsI Have lawyers draft a single annual notice so that the truth of

is-annual-notice is determined en masse for all customers.

2. Design-time analysis of business processesI (u ∈U directory) can be guaranteed true if information kiosk

responds only to directory requests.

Privacy Law

Audit Effort Example GLBA HIPAA

None Decision procedures 8 of 15 17 of 84Small, non-expert prevent-fraud purpose 12 of 15 47 of 84

Large, expert Beliefs, compliance 15 of 15 84 of 84with other laws

Page 82: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Two decision procedures:

1. Standardized data formatsI Have lawyers draft a single annual notice so that the truth of

is-annual-notice is determined en masse for all customers.

2. Design-time analysis of business processesI (u ∈U directory) can be guaranteed true if information kiosk

responds only to directory requests.

Privacy Law

Audit Effort Example GLBA HIPAA

None Decision procedures 8 of 15 17 of 84Small, non-expert prevent-fraud purpose 12 of 15 47 of 84Large, expert Beliefs, compliance 15 of 15 84 of 84

with other laws

Page 83: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Even if experts are used for auditing, the logic directs their efforts.

I Only asks experts about undecidable predicates.

I Limits experts’ attention to applicable positive norms,rather than the full law.

p1 p2

msg(q, t, u)

activerole(p1, covered-entity) ∧activerole(p2, law-enforcement) ∧belongstorole(q, deceased) ∧(t ∈T phi) ∧(u ∈U death-notification(q)) ∧believes-result-of-crime(p1, q)

activerole(p1, covered-entity) ∧activerole(p2, provider(q)) ∧(t ∈T phi) ∧(u ∈U treatment(p2))

Page 84: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Even if experts are used for auditing, the logic directs their efforts.

I Only asks experts about undecidable predicates.

I Limits experts’ attention to applicable positive norms,rather than the full law.

p1 p2

msg(q, t, u)

activerole(p1, covered-entity) ∧activerole(p2, law-enforcement) ∧belongstorole(q, deceased) ∧(t ∈T phi) ∧(u ∈U death-notification(q)) ∧believes-result-of-crime(p1, q)

activerole(p1, covered-entity) ∧activerole(p2, provider(q)) ∧(t ∈T phi) ∧(u ∈U treatment(p2))

Page 85: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Even if experts are used for auditing, the logic directs their efforts.

I Only asks experts about undecidable predicates.

I Limits experts’ attention to applicable positive norms,rather than the full law.

p1 p2

msg(q, t, u)

activerole(p1, covered-entity) ∧activerole(p2, law-enforcement) ∧belongstorole(q, deceased) ∧(t ∈T phi) ∧(u ∈U death-notification(q)) ∧believes-result-of-crime(p1, q)

activerole(p1, covered-entity) ∧activerole(p2, provider(q)) ∧(t ∈T phi) ∧(u ∈U treatment(p2))

Page 86: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Even if experts are used for auditing, the logic directs their efforts.

I Only asks experts about undecidable predicates.

I Limits experts’ attention to applicable positive norms,rather than the full law.

p1 p2

msg(q, t, u)

activerole(p1, covered-entity) ∧activerole(p2, law-enforcement) ∧belongstorole(q, deceased) ∧(t ∈T phi) ∧(u ∈U death-notification(q)) ∧believes-result-of-crime(p1, q)

activerole(p1, covered-entity) ∧activerole(p2, provider(q)) ∧(t ∈T phi) ∧(u ∈U treatment(p2))

Page 87: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Audit effort during enforcement

Even if experts are used for auditing, the logic directs their efforts.

I Only asks experts about undecidable predicates.

I Limits experts’ attention to applicable positive norms,rather than the full law.

p1 p2

msg(q, t, u)

activerole(p1, covered-entity) ∧activerole(p2, law-enforcement) ∧belongstorole(q, deceased) ∧(t ∈T phi) ∧(u ∈U death-notification(q)) ∧believes-result-of-crime(p1, q)

activerole(p1, covered-entity) ∧activerole(p2, provider(q)) ∧(t ∈T phi) ∧(u ∈U treatment(p2))

Page 88: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Structure Features Ambiguity Enforcement

Outline

Structure of privacy laws

Features of the logic PrivacyLFPFeatures with syntactic support onlyFeatures with semantics

Ambiguity in GLBA’s limits on redisclosure

Preliminary ideas for enforcement

Conclusion

Page 89: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Conclusion

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy lawsI Purposes, beliefs, dynamic roles, concrete temporal

requirements, and self-referential clauses

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Future work:

I Enforcement!

I Semantics for de-identified data and purposes to reduce auditeffort

Page 90: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Conclusion

Contributions:

1. PrivacyLFP, a logic and signature for expressing privacy lawsI Purposes, beliefs, dynamic roles, concrete temporal

requirements, and self-referential clauses

2. Complete formalizations of HIPAA and GLBA’soperational requirements for transmissions

3. Ambiguities in HIPAA and GLBA revealed by our formalization

4. Preliminary ideas for enforcement of HIPAA, GLBA, etc.

Future work:

I Enforcement!

I Semantics for de-identified data and purposes to reduce auditeffort

Page 91: Experiences in the Logical Specification of the HIPAA and ...€¦ · I Formalization e orts have not covered full privacy laws. I Do these techniques scale to speci cation and computer-assisted

Thank you!