Conge 精进

Intro to Health Informatics 第四周笔记

2015-09-08
本文 3075 字,阅读全文约需 9 分钟

Lesson 4: Private, Security and Trust

People’s Protected Health information ( PHI, healthcare data that is linked to information that identifies the patient) is protected by HIPPA. PHI can only be accessed by authorized person for legitimate purpose.

Patients' Access to data improve their care

Only 1 in 14 people used PHR, so the doption rate is low.

The main concern is the privacy of their data

And most of people do not even want their data to be digitized.

Sub-area of data protection in healthcare

  • Privacy: only people authorized by patient can see health data.
  • Security: data is protected from unauthorized access.
  • Trust: senders and recipients of health information knows that the people they are interacting with are who they say they are.

Three Sub-area of data protection in healthcare

Quiz 1

Quiz 2

Quiz 3

S & I Process

Lab testing ordering workflow

Privacy Consent Models

CurrentCare uses Opt-in model.

Data segmentation

Data segmentation

Models for data segmentation

Models for data segmentation

A: Too complicated for patient to understand

Public Key infrastructure (PKI), a solution for Trust

Given the public, it is very complicated to calculate the private key.

The use case of public key and private key for data encreption (top) and digital signature (bottom)

Quiz 4

Quiz 5

Registration authority verifies identity of providers and certificate authority issue certificates

So brower can verify that the public keys are indeed from the CA by decrept the keys with CA's public key

How to view public key of Google

Other use cases of PKU

Concerns about PKI

Interview with Dr. Don Detmer

Q1. Where we are in transforming our healthcare systems with HIT, and what’s the future?

A: digital records were believed to be essential in healthcare in 1991, but it is in 2009 when HITECH legislation started, things becomes more exciting. Current HIT is in developing, there are things that are exciting and things we don’t like. The use of HIT in terms of computer technology and communication technology are very exciting right now.

Q2. getting digital health data is import but time consuming, the concern is the patients’ privacy issues. Does the emphasis of privacy harming the use of data, how to balance privacy and data sharing?

A: HIPPA is developed pre web area with the paper system in mind. Misuse of the data at that time can bring real harm to people and to the society. But researchers and students want to use the data for research and educational purpose which usually have very low risk. Patients like the idea of using big data for research but culturally they might now want to share their data. We really need very big dataset to address the new health problems. Because of the privacy issue, a lot of study could not even get started. Data liquidity (relative free flowing of data) is an important issue the field needs to solve.

Q3. What’s your thought on Patient generated and controlled data repository (VIA PHR), will it contribute to the share of clinical data for research and other purpose.

A: It sounds great but researchers might ended up getting disportionately represented data because certain group of the population decide to opt out.

Supplementary material

064/100 《Contemporary Health Informatics》Chapter 4 Summary

Key Concepts/Vocabulary

● HIPAA ● Protected Health Information (PHI) ● De-identified health information ● Privacy ● Security ● Trust ● Personal Health Records (PHRs) ● Privacy Consent Models ● Data Segmentation ● Data Segmentation Models ● Public Key Infrastructure (PKI) ● Public and Private Keys ● Registration Authority ● Certificate Authority

Readings

Graphics

Websites

2015-09-07 初稿
2015-09-08 添加 Interview with Dr. Don Detmer 部分
原文地址 https://conge.livingwithfcs.org/2015/09/08/Intro-to-Health-Informatics-di-si-zhou-bi-ji/
Paypal
请我喝咖啡

Comments

Content