240 likes | 406 Views
Medical information systems and privacy policy. John C Mitchell, Stanford University. Outline. Medical privacy problem One part of a larger set of interesting challenges Contextual integrity Philosophical account of privacy, made precise Workflow Modeling hospital process
E N D
Medical information systemsand privacy policy John C Mitchell, Stanford University
Outline • Medical privacy problem • One part of a larger set of interesting challenges • Contextual integrity • Philosophical account of privacy, made precise • Workflow • Modeling hospital process • Useful on its own; approach to privacy in context • HIPAA formalization • Sample effort to write down complex policy and use this in prototype system
Privacy in Organizational Processes Patient medical bills Patient information Hospital Insurance Company Drug Company Advertising Patient GOAL: Respect privacy expectations in the transfer and use of personal information within and across organizational boundaries
Subproblem: accessing patient health info Doctor Specialist Electronic Health Record Patient Portal HIPAA Compliance Surrogate Patient
Goals • Express policy precisely • Enterprise privacy policies • Privacy provisions from legislation • Analyze, enforce privacy policies • Does action comply with policy? • Does policy enforce the law? • Support audit • Privacy breach may occur. Find out how it happened
Contextual Integrity • Philosophical account of privacy • Transfer of personal information • Describes what people care about • Flow governed by norms • Agents act in roles in social contexts • Information categorized by type • E.g., personal health information, psychiatric records, … • Rejects public/private dichotomy • Principles of transmission • Confidentiality, reciprocity, dessert, etc [Nissenbaum 2004, BarthDMN ‘06]
Privacy Model: “Contextual Integrity” Charlie’s SSN 078-05-1120 Alice Bob • Four identifiers of an action: • Sender • Receiver • Person this is about (subject) • Type of information
Sender role Attribute Subject role Recipient role Transmission principle Gramm-Leach-Bliley Example Financial institutions must notify consumers if they share their non-public personal information with non-affiliated companies, but the notification may occur either before or after the information sharing occurs
One technical slide for fun CI Norms and Policies • Policy consists of norms (+) inrole(p1, r1) inrole(p2, r2) inrole(q, r) tt’ () inrole(p1, r1) inrole(p2, r2) inrole(q, r) tt’ • is an agent constraint • is a temporal condition • Norms assembled into policy formula • p1,p2,q:P.m:M.t:T.incontext(p1, c) send(p1, p2, m) contains(m, q, t) { + | + norms+(c) } { | norms(c) }
MyHealth@Vanderbilt Workflow example Humans + Electronic system Health Answer Appointment Request Secretary Health Question Health Question Doctor Patient Health Question Health Answer Utility: Schedule appointments, obtain health answers Nurse Privacy: HIPAA compliance+
Contextual Integrity Organizational process and compliance Norms Purpose Organizational Objectives Information Policy Utility Checker (ATL*) Privacy Checker (LTL) Organizational Process Design Utility Evaluation Compliance Evaluation
Auditing Business Process Execution Run-time Monitor Audit Logs Audit Algs Privacy Policies Utility Goals Policy Violation + Accountable Agent
What is the logical structure of HIPAA? • Allow action if • There is a clause that explicitly permits it • And no clause explicitly forbids it • In more detail ... • Action: to, from, about, type, purpose, consents, beliefs • e.g. Dr., lab, patient, PHI, treatment, -, - • Example 164.502 (a) Standard: (1) Permitted uses and disclosures. (ii) For treatment, payment, or health care operations, as permitted by and in compliance with 164.506;
Refinement and Combination • Policy refinement • Basic policy relation • Does hospital policy enforce HIPAA? • P1 refines P2 if P1 P2 • Requires careful handling of attribute inheritance • Combination becomes logical conjunction • Defined in terms of refinement
Policy lifecycle issues • Requirements capture • What should the policy say? • Development • Adapt standard modules; build new ones; combine • Evaluation • Does the policy say what we want? • Analysis Testing Debugging • Compliance • Can the policy be enforced by system? Support audit? • Maintenance • Change as needed as requirements evolve
Compliance Contemplated Action Judgment Policy Future Reqs History • Strong compliance • Future requirements after action can be met • Theorem: decidable in PSPACE • Weak compliance • Present requirements met by action • Theorem: decidable in Polynomial time
Related Languages • Legend: unsupported o partially supported full supported • CI fully supports attributes and combination
Conclusions • Framework • Concurrent game model • Logic of Privacy and Utility • Temporal logic (LTL, ATL*) • Business Process as Workflow • Role-based responsibility for human and mechanical agents • Algorithmic Results • Workflow design assuming agents responsible • Privacy, utility decidable (model-checking) • Minimal disclosure workflow constructible • Auditing logs when agents irresponsible • From policy violation to accountable agents • Applications • MyHealth@Vanderbilt patient portal, ... Acknowledgements: CMU, Vanderbilt, TCS