li xiong cs573 data privacy and security healthcare privacy and security

69
Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Upload: quentin-mathews

Post on 11-Jan-2016

228 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Li Xiong

CS573 Data Privacy and Security

Healthcare privacy and security

Page 2: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Patients Are Concerned Did you know...

77 percent of all Americans feel their personal health information privacy is very important, and

84 percent said they were very concerned or somewhat concerned that personal health information might be made available to others without their consent.

Only 7 percent said they are willing to store or transmit personal health information on the Internet, and only 8 percent felt a Web site could be trusted with such information.

Page 3: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Patients Are Concerned:

Did you know... 90 percent said they would trust their doctor to

keep their personal health information private and secure, and 66 percent said they would trust a hospital to do the same.

Only 42 percent said they would trust an insurance company, and 35 percent would trust a managed care company.

Page 4: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

New Patients Privacy Regulations!

HIPAA Health Insurance

Portability and Accountability Act of 1996

Federal Privacy Regulations(April 2001)

Established patients’ rights to privacy of their health information

Page 5: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

5

WHAT IS HIPAA?

Health Insurance Portability Accountability Act of 1996

Sets standards and requirements for maintenance and electronic transmission of patient health information

Covers 4 areas Privacy of information Security of data Transactions and code set standards for electronic

transactions Identifiers for providers, employers, and payers

Page 6: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

TO WHOM DOES HIPAA APPLY? Health Plans, including health insurance companies, HMOs, company

health plans, and certain government programs that pay for health care, such as Medicare and Medicaid.

Most Health Care Providers - those that conduct certain business electronically, such as electronically billing your health insurance including most doctors, clinics, hospitals, psychologists, chiropractors, nursing homes, pharmacies, and dentists.

Health Care Clearinghouses - entities that process nonstandard health information they receive from another entity into a standard (i.e., standard electronic format or data content), or vice versa.

Page 7: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

7

WHAT INFORMATION IS PROTECTED?

HIPAA Regulates “Protected Health Information” (“PHI”)

PHI is: information, oral or recorded, in any form

or medium, that: Is created or received by a provider, plan,

etc.; and Relates to past, present or future physical

or mental health or condition of an individual, the provision of health care to an individual, or past, present or future payment for the provision of health care

Page 8: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

WHAT IS THE SECURITY RULE?

Applies to physical, technical and administrative requirements to protect maintenance, availability and confidentiality of PHI

Closely intertwined with Privacy Rule Requires appropriate technological measures and physical security

safeguards to maintain the security of PHI Will require Policies and Procedures and training for:

Password Maintenance Access Controls Physical Controls

Logging off computers Screensavers Locking doors and files cabinets

E-Mail Risks Other

Page 9: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

9

WHAT IS THE TRANSACTIONS AND CODE SET RULE?

Covers 8 EDI transactions between or within Covered Entities (or their Business Associates) Claims Remittances COB Eligibility Referral Certification Claim Status Enrollment Premiums

Providers conducting electronic transactions must conduct “standard transactions” Standard Codes Minimum data sets

Page 10: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

10

WHAT IS THE PRIVACY RULE? A Covered Entity may only use or disclose PHI in

certain circumstances Covered Entity must make reasonable efforts to limit

use or disclosure of PHI to the “minimum necessary” amount to accomplish the intended purpose of the use or disclosure of the PHI

Page 11: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Principle of Disclosure

The Privacy Rule establishes a list of acceptable and unacceptable ways to use PHI.

The Privacy Rule may be waived by a signature of a patient. Q: How many things do you sign when you go to

the doctor? Q: Do you know what they say? Q: Do you really have a choice to not sign then?

Page 12: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Principle of Disclosure

The Privacy Rule does, however, ensure that individuals have access to the information stored about them. Also allows HHS to view your medical records

when they’re “undertaking a compliance investigation”

Page 13: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

De-identified Health Information

No restrictions on the use or disclosure of de-identified health information

A de-identification is achieved by a formal determination by a qualified

statistician or Removal of certain identifiers (i.e., safe harbor

rule.)

Page 14: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Explicitly Acceptable Disclosures

Disclosure to the individual (required) Disclosure to: (allowed without consent)

Treatment Operations Payment Operations Health Care Operations

Page 15: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Explicitly Acceptable Disclosures

Disclosure in Public Interest and Benefit Activities Public Health (prevention or containment of a

disease) Employees where transmission of a

dangerous disease was likely Victims of abuse, neglect, violence, etc Heath oversight activates and judicial

proceedings

Page 16: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Explicitly Acceptable Disclosures

Disclosure in Public Interest and Benefit Activities (cont’d) Law enforcement purposes Decedents Organ, eye, tissue donations Research purposes Serious threat to public safety … and more…

Page 17: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Limited Data Set

A limited data set is PHI from which certain identifier information is removed. Names; Postal address information, other than town or city,

State and zip; Telephone numbers, Fax numbers; Electronic mail addresses; Social security numbers; Medical record numbers; Health plan beneficiary numbers; Account numbers; Certificate/license numbers; Vehicle identifiers and serial numbers, including license plate numbers; Device identifiers and serial numbers; Web Universal Resource Locators (URLs); Internet Protocol (IP) address numbers; Biometric identifiers, including finger and voice prints; Full face photographic images and any comparable images.

Limited data set can be used for research purposes provided that the recipient of the data signs an agreement

Page 18: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Authorized Uses and Disclosures

All other uses and disclosures of data must have explicit written authorization by the individual.

Page 19: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Minimum Necessary Clause

One of the central aspects of the entire Privacy Rule is that only the minimally necessary amount of PHI is disclosed.

The minimum necessary clause does not cover: Health care providers for treatment Individuals who is the subject of the

information Disclosures made pursuant to an authorization Disclosure to HHS or required by law Disclosure for HIPAA compliance reviews

Page 20: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

What does it mean to patients?

Page 21: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Access

Patients have the right to Access or inspect their health record Obtain a copy from their healthcare provider

Reasonable fees may be charged for copying Access and copying for as long as information

is retained There are a few exceptions

Page 22: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Amend Patients have the right to

request an amendment (clarification or challenge) to their medical record May need to put request in

writing Organization will review

and determine if they agree or disagree

Request for amendment becomes part of permanent record.

Page 23: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Account for Disclosures

Patients have the right to request a list of when and where their confidential information was released A list of disclosures (releases) within past six

years (starting in April 2003) Date of disclosure Name of person or entity who received information

and address if known Brief description of reason for disclosure

Exceptions: treatment, payment healthcare operations

Page 24: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Request Restrictions

The patient has the right to request an organization to restrict the use and disclosure (release) of their confidential information Can request restriction in use of information

for treatment, payment, or healthcare operation purposes

Organization is not required to agree with restriction(s)

Patient can request to receive communication by alternative means or locations.

Page 25: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to File a Complaint

The patient has the right to file a complaint if he or she believes privacy rights were violated* Individual within the

organization The Secretary of the

Department of Health and Human Services

* Organization must provide contact information for filing a complaint

Page 26: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Receive Notice

The patient has the right to receive a notice of privacy practices Notice describes

How medical information is used and disclosed by an organization

How to access and obtain a copy of their medical records

A summary of patient rights under HIPAA How to file a complaint, and contact information

for filing a complaint

Page 27: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

There Are Penalties

Both criminal and civil penalties for: Failure to comply with HIPAA requirements Knowingly or wrongfully disclosing or

receiving individually identifiable health information

Obtaining information with intent to: Sell or transfer it Use it for commercial advantage Use it for personal gain Use it for malicious harm

Page 28: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Penalties

HHS may impose monetary civil penalties for violations of the Privacy Rule: $100 per failure to comply with a Privacy Rule

requirement (up to $25,000/yr/company for violations of the same Privacy Rule requirement)

Page 29: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Penalties

Criminal Penalties Any person (a physical person or an

incorporated company) who knowingly obtains or discloses PHI is in violation of HIPAA and faces:

Up to a $50,000 fine Up to a one-year prison term

An intention to sell, transfer, or use PHI increase both the fine and the prison term

Page 30: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Complaints related to HIPAA

Page 31: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Enforcement Results

Page 32: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

33

Legislative & Regulatory Needs

1. “Fixes” – problems that need to be addressed

2. “Challenges” – issues that need to be addressed, but for which we lack clarity about how to do so while minimizing cost and disruptions in health system operations

3. “Conundrums” – questions without obvious answers; need for further study

Page 33: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

34

“Fixes”

HIPAA Applicability Scope Tied to Administrative Transactions Other provider organizations that do not participate in administrative

transactions are not required to comply with HIPAA Privacy and Security Rules

Need to address all organizations that collect, receive, maintain, or use individually identifiable health information

Inconsistent Applicability of Privacy and Security Rules Privacy Rule applies to all individually identifiable health information Security Rule applies only to electronic health information Both need to apply to all identifiable health information, with

appropriate provisions for electronic and non-electronic media

Page 34: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

“Challenges”

Notification of “Security Breaches” Lack definition Public notification may encourage others to exploit

vulnerabilities How to measure severity, intention, potential harm

Right to Anonymous Care Accounting for Disclosures

Consumer has right to know who has accessed his or her health information

“Healthcare Operations” Scope Health information may be released without patient’s consent

for purposes of treatment, payment, and “healthcare operations”

Need to constrain definition of “healthcare operations”

Page 35: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

“Conundrums”

Determining “Minimum Necessary” Need to allow for context specificity

“De-identification” of Health Information Consumers with less common conditions, and consumers in sparsely

populated areas are at higher risk of re-identification Moving target – as systems become faster and more interconnected, “de-

identification” becomes less feasible In some cases, the ability to “re-link” health information to an individual is

beneficial to the health and safety of that individual Sale of Health Information

Who owns the information – and therefore stands to profit from its sale? Is ownership permanently bound with the individual about whom the

information originally was collected? In other words, can ownership change once information is “de-identified?”

Is an individual’s authorization required in order to sell his or her health information?

Page 36: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

De-identification of health information

A considerable amount of protected health information resides in unstructured text forms

Clinical history: 77 year old female with a history of B-cell lymphoma.

Medical text de-identification systems are specialized and do not utilize advanced anonymization schemes Extraction of identifying information Removal or masking of the identifying

information Data privacy and anonymization research

focus on structured data

Page 37: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

HIDE – Health Information DE-identification (Gardner ‘08) De-identification System

Privacy Model Conceptual Framework Attribute Extraction Anonymization

Experiments

Page 38: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

HIPAA De-Identification Options

Full De-identification all of the HIPAA identifiers (direct and indirect)

have been removed Partial De-identification

All of the direct HIPAA identifiers are removed but not the indirect ones

Statistical De-identification Maintain useful information while guaranteeing

statistically acceptable privacy

Page 39: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

HIPAA Identifiers1. Names;

2. All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000.

3. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older;

4. Phone numbers;

5. Fax numbers;

6. Electronic mail addresses;

7. Social Security numbers;

8. Medical record numbers;

9. Health plan beneficiary numbers;

10. Account numbers;

11. Certificate/license numbers;

12. Vehicle identifiers and serial numbers, including license plate numbers;

13. Device identifiers and serial numbers;

14. Web Universal Resource Locators (URLs);

15. Internet Protocol (IP) address numbers;

16. Biometric identifiers, including finger and voice prints;

17. Full face photographic images and any comparable images; and

18. Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)

Page 40: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Person-Centric Identifier View

Anonymization

Data Linking

Identifying and Sensitive

Information Extraction

Heterogeneous Health Information

Anonymized View

Conceptual Framework

Page 41: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

CRF-based Attribute Extraction

Page 42: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Attribute Extraction

The extraction consists of: tagging software which can be used to tag data with

identifying and sensitive attributes to build the training dataset,

a CRF-based classifier a set of data preprocessing and postprocessing

strategies for extracting the features from text data for the classifier and feeding the classified data back to the tagging software for retagging and corrections.

We use an iterative process for classifying and retagging which allows the construction of a large training dataset without intensive human efforts in labeling the data from scratch.

Page 43: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Conditional Random Fields

Conditional Random Fields (CRFs) are a probabilistic framework for labeling structured data.

CRFs define a conditonal probability over the label sequences rather than a joint probability.

Page 44: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Anonymization

Full De-identification by removing all extracted attributes

Partial De-identification by removing specific attributes

Statistical De-identification by using k-anonymization (or l-diversity) on the extracted attributes

Page 45: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Experiments Setup

Using 100 hand-tagged pathology reports from the Winshop Cancer Institute at Emory

Effectiveness of Attribute Extraction (10-fold cross-validation)

Metrics Precision is the number of correctly labeled identifying

attributes over the total number of labeled identifying attributes

Recall is the number of correctly labeled identifying attributes over the total number of identifying attributes in the text

Page 46: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Accuracy of Attribute Extraction by the CRF (10-fold cross validation)

Page 47: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Experiments

Effectiveness of De-identification (we randomly generated 10000 queries with a selection predicate of the form age > n and age < n to select the corresponding reports)

Metric Query precision

Page 48: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security
Page 49: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Ongoing Work

Linking and mapping of extracted attributes with entities

Indirect identifying information extraction Exploring anonymization approaches that

prioritize attributes based on the importance to privacy and to the application needs

Page 50: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security
Page 51: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Protecting Patient Privacy— It’s Everyone’s Responsibility

Page 52: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

What Happens If Patients Don’t Trust Us?

Quality care is compromised conditions may go

undetected or untreated

health information may not be complete and accurate

Page 53: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

What Do Patients Do When They Don’t Trust Us? Do not obtain treatment Give incomplete or

inaccurate information Pay out of pocket to

prevent an insurance claim Move from one physician

to another Ask the doctor not to

document their actual condition

Page 54: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Your Responsibilities

Curb human nature curiosity sharing

Be sensitive Respect the patient’s

right to privacy Know your

organization’s policies

Page 55: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

New Patient Rights Are on the Way

HIPAA Health Insurance

Portability and Accountability Act of 1996

Federal Privacy Regulations(April 2001)

Established patients’ rights to privacy of their health information

Page 56: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Access

Patients have the right to Access or inspect their health record Obtain a copy from their healthcare provider

Reasonable fees may be charged for copying Access and copying for as long as information

is retained There are a few exceptions

Page 57: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Amend Patients have the right to

request an amendment (clarification or challenge) to their medical record May need to put request in

writing Organization will review

and determine if they agree or disagree

Request for amendment becomes part of permanent record.

Page 58: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Account for Disclosures

Patients have the right to request a list of when and where their confidential information was released A list of disclosures (releases) within past six

years (starting in April 2003) Date of disclosure Name of person or entity who received information

and address if known Brief description of reason for disclosure

Exceptions: treatment, payment healthcare operations

Page 59: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Request Restrictions

The patient has the right to request an organization to restrict the use and disclosure (release) of their confidential information Can request restriction in use of information

for treatment, payment, or healthcare operation purposes

Organization is not required to agree with restriction(s)

Patient can request to receive communication by alternative means or locations.

Page 60: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to File a Complaint

The patient has the right to file a complaint if he or she believes privacy rights were violated* Individual within the

organization The Secretary of the

Department of Health and Human Services

* Organization must provide contact information for filing a complaint

Page 61: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Right to Receive Notice

The patient has the right to receive a notice of privacy practices Notice describes

How medical information is used and disclosed by an organization

How to access and obtain a copy of their medical records

A summary of patient rights under HIPAA How to file a complaint, and contact information

for filing a complaint

Page 62: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

There Are Penalties

Both criminal and civil penalties for: Failure to comply with HIPAA requirements Knowingly or wrongfully disclosing or

receiving individually identifiable health information

Obtaining information under false pretences Obtaining information with intent to:

Sell or transfer it Use it for commercial advantage Use it for personal gain Use it for malicious harm

Page 63: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Doing Your Part

Only access confidential information if you need it to do your job

Protect your computer passwords

Understand the law and your organization’s policies

Attend training and education programs Report problems Treat your patient’s information the way you

would want your personal information treated

Page 64: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Protect Confidential Information

Providing patients with quality healthcare includes protecting their confidential information.

Page 65: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

Your HIM Professionals Are Committed! HIM Code of Ethics—

Promote and protect confidentiality and security Our goal is to maintain patient trust that their

Medical records are protected Confidential information is kept private

Continue to maintain and improve systems and safeguards to protect patient privacy

Page 66: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

67

*Dictionary.com Unabridged (V1.1)

Privacy – the state of being free from intrusion or disturbance in one’s private life or affairs;* in the US, the right to such a state Implies a degree of individual

control over personal intrusions Security – something that frees from

danger or harm, or that makes safe;* defensive measures that protect the confidentiality, integrity, and availability of sensitive and safety-critical health information, and mechanisms for providing indisputable accountability

Definitions

Page 67: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

68

need to provide

Safe, HighQuality CareConsumers

have the right to

want and need

Health CareProviders

Privacy and Security Context

in the provision ofPersonalPrivacy

Page 68: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

69

SECURITYMECHANISMS

Security Policy

SECURITYMECHANISMS

in order to make

restrict & enable

Timely AccessComplete, Accurate HealthInformation

Safe, HighQuality Care

require

resulting in

Optimal Diagnostic& TreatmentDecisions

Consumers

Data IntegrityMeasures

AvailabilityMeasures

Authenticity &AccountabilityMeasures

have the right to

to

helpprotect

ConfidentialityMeasures

help assure protect & verify

want and need

help assure & verify

Health CareProviders

Privacy and Security Context

PersonalPrivacy

in the provision of

Page 69: Li Xiong CS573 Data Privacy and Security Healthcare privacy and security

70

Security Policy

requires enforcementof

establishenterprisepolicy

The Delicate Balance:Private, Appropriate, and Safe Care

Timely AccessComplete, Accurate HealthInformation

Safe, HighQuality Care

require

resulting in

Optimal Diagnostic& TreatmentDecisions

in order to make

Consumers

Data IntegrityMeasures

AvailabilityMeasures

Authenticity &AccountabilityMeasures

have the right to

to

helpprotect

ConfidentialityMeasures

want and need

help assure & verify

provide personalconsent

directives

Governments

Health CareProviders

CAN IMPEDE

CREATINGRISK TO

in the provision ofPersonalPrivacy

enact laws &

regulations

Consumers

Health CareProviders

PersonalPrivacy

Safe, HighQuality Care

Privacy Rules

restrict & enable help assure protect & verify