Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
1
2
5
6
7
9
10
12
13
14
17
18
19
20
22
23
25
26
29
1
2
3
4
5
2014 OSEHRA Open Source Summit: Global Collaboration in Health IT
2014-09-03 - 2014-09-05    
8:00 am - 5:00 pm
OSEHRA is an alliance of corporations, agencies, and individuals dedicated to advancing the state of the art in open source electronic health record (EHR) systems [...]
Connected Health Summit
2014-09-04    
All Day
The inaugural Connected Health Summit: Engaging Consumers is the only event focused exclusively on the consumer-focused perspective of the fast-growing digital health/connected health market. The [...]
Health Impact MidWest
2014-09-08    
All Day
The HealthIMPACT Forum is where health system C-Suite Executives meet.  Designed by and for health system leaders like you, it provides an unmatched faculty of [...]
Simulation Summit 2014
2014-09-11    
All Day
Hilton Toronto Downtown | September 11 - 12, 2014 Meeting Location Hilton Toronto Downtown 145 Richmond Street West Toronto, Ontario, M5H 2L2, CANADA Tel: 416-869-3456 [...]
Webinar : EHR: Demand Results!
2014-09-11    
2:00 pm - 2:45 pm
09/11/14 | 2:00 - 2:45 PM ET If you are using an EHR, you deserve the best solution for your money. You need to demand [...]
Healthcare Electronic Point of Service: Automating Your Front Office
2014-09-11    
3:00 pm - 4:00 pm
09/11/14 | 3:00 - 4:00 PM ET Start capitalizing on customer convenience trends today! Today’s healthcare reimbursement models put a greater financial risk on healthcare [...]
e-Patient Connections 2014
2014-09-15    
All Day
e-Patient Connections 2014 Follow Us! @ePatCon2014 Join in the Conversation at #ePatCon The Internet, social media platforms and mobile health applications are enabling patients to take an [...]
Free Webinar - Don’t Be Denied: Avoiding Billing and Coding Errors
2014-09-16    
1:00 pm - 2:00 pm
Tuesday, September 16, 2014 1:00 PM Eastern / 10:00 AM Pacific   Stopping the denial on an individual claim is just the first step. Smart [...]
Health 2.0 Fall Conference 2014
2014-09-21    
12:00 am
We’re back in Santa Clara on September 21-24, 2014 and once again bringing together the best and brightest speakers, newest product demos, and top networking opportunities for [...]
Healthcare Analytics Summit 14
2014-09-24    
All Day
Transforming Healthcare Through Analytics Join top executives and professionals from around the U.S. for a memorable educational summit on the incredibly pressing topic of Healthcare [...]
AHIMA 2014 Convention
2014-09-27    
All Day
As the most extensive exposition in the industry, the AHIMA Convention and Exhibit attracts decision makers and influencers in HIM and HIT. Last year in [...]
2014 Annual Clinical Coding Meeting
2014-09-27    
12:00 am
Event Type: Meeting HIM Domain: Coding Classification and Reimbursement Continuing Education Units Available: 10 Location: San Diego, CA Venue: San Diego Convention Center Faculty: TBD [...]
AHIP National Conferences on Medicare & Medicaid
2014-09-28    
All Day
Balancing your organization’s short- and long-term needs as you navigate the changes in the Medicare and Medicaid programs can be challenging. AHIP’s National Conferences on Medicare [...]
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Events on 2014-09-04
Connected Health Summit
4 Sep 14
San Diego
Events on 2014-09-08
Health Impact MidWest
8 Sep 14
Chicago
Events on 2014-09-15
e-Patient Connections 2014
15 Sep 14
New York
Events on 2014-09-21
Health 2.0 Fall Conference 2014
21 Sep 14
Santa Clara
Events on 2014-09-24
Healthcare Analytics Summit 14
24 Sep 14
Salt Lake City
Events on 2014-09-27
AHIMA 2014 Convention
27 Sep 14
San Diego
Events on 2014-09-28
Events on 2014-09-30
Events on 2014-10-02
Articles

Using the cloud data life cycle to protect patient privacy

cloud data life cycle

Using the cloud data life cycle to protect patient privacy

In an ideal world, technology would maximize individual benefits while also protecting privacy.

But in practice, the pivot to digital-first healthcare has sometimes left personal information vulnerable to attack – as evidenced by the recent spike in targeting of health systems.

One example of this paradigm, says Dr. James Angle, product manager for IT services in information security, at Trinity Health, involves the migration of increased amounts of data to the cloud.

“Before the use of cloud, PHI was stored either in the [health delivery organization’s] data center or a third-party data center,” noted Angle, who will be presenting on the subject at HIMSS21 in August.

“With cloud, data is stored in multiple data centers in multiple jurisdictions,” Angle continued. “The increase [in] data storage locations gives attackers more targets.”

“In addition, having multiple jurisdictions means more, as well as different, requirements. This adds complexity, which is the enemy of privacy and security,” he added.

During his HIMSS21 presentation, Angle will discuss the process of analyzing how an organization collects, uses, shares and maintains personal identifying information, as well as how to best protect that information.

“Ensuring privacy for our patients is a process that starts with privacy engineering and includes conducting privacy risk assessments and understanding the data life cycle,” he said. “If these processes are followed, we will enhance our ability to protect our patients’ information.”

Angle will also explain how HIPAA’s privacy rule functions in the context of security and information sharing.

“The purpose of the privacy rule is to give patients more control over their health information. The HIPAA Privacy Rule creates national standards to protect individuals’ medical records and other protected health information,” he said.

“Additionally, the privacy rule defines and limits the circumstances in which an individual’s PHI can be used or disclosed by a covered entity or its business associates,” he continued.

Returning to the matter of the cloud, Angle notes that the data life cycle gives the analyst a structured way to look at privacy.

“There are six phases in the cloud data life cycle: create, store, use, share, archive and destroy. Each phase has different requirements and issues that must be addressed,” he said.

The “create” phase, which involves the generation or acquisition of new data or the modification of existing data, can be a useful example of this.

“When personal data is collected, it is important to remember that the individual whose data is being collected has the right to know what data is being collected, what the data will be used for, and if it will be shared,” Angle said. “The collector must obtain consent, which means asking users for permission to process their data.

“Healthcare delivery organizations must explain their data collection practices in clear and simple language, and then users must explicitly agree to them. Additionally, it defines who can collect PHI/PII data and map the data to access rights for everyone who has access,” he added.

Even as the cloud has enabled innovation, Angle notes that it also adds complexity to an organization’s data protection plan.

“Data must not only be protected inside the HDO’s network but also in transit and in the cloud,” he said. “The HDO needs to know where the data will be stored, who has access to the data, and what controls are in place to protect the data.”

“Using the data life cycle, the analyst can look at the requirements for each phase and ensure the correct controls are in place to protect the patient’s privacy throughout the entire data life cycle,” he continued.

“By using the data life cycle, you are answering who, what, when, why, and how the data is treated in each phase. This will give you a clear picture of the data and, in turn, how to protect the data.