A pill box with biometric access control and web connection (work in progress)

Size: px
Start display at page:

Download "A pill box with biometric access control and web connection (work in progress)"

Transcription

1 A pill box with biometric access control and web connection (work in progress) Eiji Okamoto 1 René Peralta 2 1 Institute of Information Sciences and Electronics, University of Tsukuba 2 Department of Computer Science Yale University 1 Introduction Because of the increased connectivity of households to the Internet it is now possible to consider the latter as a medium for delivery of a variety of social services. In this work, we propose dispensing prescription drugs remotely via specialized internet-enabled devices. To our knowledge, there are no such medication delivery devices in use at this time, although the idea has most probably been considered by the pharmaceutical industry. 2 Smart pill boxes We envision a class of smart, portable devices equiped with biometric access controls. These devices will be brought home by the patient and will be connected to the Internet in a variety of possible ways. They will perform on-line and off-line tasks that will translate into more effective controls at reduced costs. They will help the patient follow prescribed treatments by keeping track of medication dispensed, issuing audio and/or visual alarms when a dosage is missed, and refuse to dispense more than the prescribed amount of medication. They will reduce the number of pharmacy visits for medication pick-up. The number of pills dispensed at each pharmacy visit is often constrained by the danger that the patient may take too many of the pills at once. The biometric access controls will prevent this. The number of pills is also constrained by the vendor s need to be assured of payment. Since these devices will be connected to the Internet, the system can remotely lock the pill box due to lack of payment (or other contingencies, such as recalls). They will safeguard the supply of medication from undetected theft by third parties (usually household members). Some of the drugs that end up for sale, say, at high schools are stolen, in small amounts, by children from household medicine cabinets. The biometric access controls would prevent this.

2 They will increase the level of confidence of the health professional in the medication being taken as prescribed. In particular, the system will be capable of issuing a remote warning when the patient stops taking the medication. This is important in the case of some psychiatric patients, the elderly, the mentally impaired, and those patients taking drugs that must be taken for a period of time after the patient is asymptomatic (for example, tuberculosis patients). They will communicate with automated control and data-gathering systems. In this way, they will support the compilation of aggregate medical data to be used by public health policy makers. Clearly, deployment of these devices raises security issues pertaining to patients s rights such as privacy and freedom from coercion. Under what circumstances a patient should be coerced into taking medication is a medical, legal and moral issue outside the scope of this work. Patients s privacy, however, can be protected by using modern cryptographic communication protocols. These protocols ensure that messages on the net are both inaccessible to unauthorized parties and carry no more information that is necessary for the message s specific purpose. We will expand on this below. 3 Selective Disclosure envelopes Modern cryptology offers powerful techniques for the controlled release of information. The devices we propose will use a variant of zero-knowledge proofs called discreet proofs [1]. Discreet proofs are short and non-interactive. They exist for any Boolean predicate whose associated language is in the class NP. Although a discreet proof is simply a string of bits. The details of how it is constructed, and what properties it has, are quite complex. Thus it is useful to create an abstract object which embodies the essential properties of a discreet proof. We suppose that a document is a string of bits containing identifiable fields. A selective disclosure envelope (SD envelope) is an abstract envelope in which a document can be inserted for digital transaction purposes. When a document D is inserted in an SD envelope by a person P, then the following holds: by default D is completely hidden by the SD envelope; once in the SD envelope, P can not alter the contents of D; at insertion time, P can choose to disclose (make readable) any field of D. for a field D that is not fully disclosed at insertion time, P can issue a discreet proof of any Boolean predicate f(d) (Note that f may be chosen after the SD envelope has been sealed and is in circulation). The role of the SD-envelope abstraction can perhaps best be understood by considering the information contained in one of our pill boxes. All these are possible:

3 name of drug; dosage information; name/address of prescribing physician; name/address of patient; name/address of health professional directly responsible for monitoring use of the device (the idea is that it should not require a medical doctor s degree to perform this task); biometric identification fields (e.g. the patient s fingerprint template); medication vendor information; patient s medical insurance information; payment history; history of missed doses; and many more, depending on the particular patient and condition. Now consider a communication between the pill box and the medication vendor. The vendor might want to know if payment for this month s supply has been received 1 and whether the pill box contains enough medication for next month. If so, then no more information need be exchanged. If there is a problem with payment, the vendor may trigger a no payment exception which would possibly involve other parties; involve exchange of other information (e.g. the medication name, the health professional in charge, and so on); produce vendor-activated actions (anything from a polite warning to a locking of the box), and corresponding audit trail; If the box needs refilling, then a completely different exchange of information would be triggered. The point of using SD-envelopes is that it allows for these information exchanges to exclude all information not relevant to the immediate need. For example, most of these communications would not reveal the identity of the patient, the identity of the prescribing doctor, or even the name of the medication in the pill box. This is a powerful tool for protecting the privacy of the patient while at the same time enforcing the patient s responsibilities. 4 Some technical challenges Discreet proofs are most efficient in what is known as the random oracle model. In practice, this requires the availability of an independent, publically accessible, source of random bits. Such a 1 This is for illustration purposes only. In practice, collection tasks are usually delegated to a third party: a payment gateway. This natural compartmentalization of tasks in E-commerce further helps with the patient s privacy goal being discussed here.

4 service was provided for some time by CCCNS ( at the University of Wisconsin. Entropy was obtained from white noise on radio waves and was expanded via standard cryptographic techniques. Several such sources can be posted on the web. This would help against denial of service attacks as well as serve the needs of users who are unwilling to trust any one source (two or more sources can be combined in such a way that all sources would have to be compromised in order to bias the bits in any way). Developing and maintaining a reliable and trusted public source of randomness with the necessary cryptographic properties (e.g. unpredictability) is not a trivial matter. However, the mathematics of doing so have been known since the 1980s. Another necessary task is to produce software that can help construct discreet proofs for predicates which are frequently encountered in E-commerce. These predicates relate to knowledge of secrets. Secrets, in this context, are bit-strings which satisfy functional equations of the type F (x) = y where F is a one-way function and y is public. The most commonly used one-way functions are based on substitution-permutation ciphers (e.g. DES), modular exponentiation, integer factorization (e.g. RSA, quadratic residuosity), and exponentiation over elliptic curves. Discreet proofs are circuit-based cryptographic primitives. In order to make these proofs as short as possible, circuits must be designed for each one-way function of interest. These circuits are special in that they should contain only addition and multiplication over GF (2). 2 Furthermore, the number of multiplications should be as small as possible. This is because the length of discreet proofs is proportional to the number of multiplications in the circuit but independent of the number of additions. The second author, along with Michael Fischer at Yale, have implemented selective disclosure envelopes for another E-commerce application (on-line Vickrey auctions). This work has provided us with a proof-of-concept as well as ballpark efficiency measures. Another task is related to circuit complexity: in [1] is is shown that the length of a discreet proof (of knowledge of a secret S which satisfies a circuit C) is at most 4rθ + 2rk = 4θ(log 2 (2θ) + r) + 2rk = 4θ log 2 (2θ) + r(4θ + 2k) where θ is the number of conjunctions in C. k is the length of one bit-commitment. r is a security parameter such that the probability of a false proof goes undetected is of the order (1/2) r. Thus, the minimum number of conjunctions necessary to build a circuit for a given function f over the base (, ) is of much interest to this work. We call this complexity measure on f the multiplicative complexity of f and we denote it by f (). In [2] it is shown that the multiplicative 2 Note that the Boolean operators (, ), correspond to (addition,multiplication) over GF (2).

5 complexity of a random function is approximately the square root of the Boolean complexity of the same function. The exact multiplicative complexity of classes of functions of interest to cryptology is not known. However, it is reasonable to expect that they too have a much lower multiplicative complexity than Boolean complexity. 5 Looking further ahead In Japan, remote sensor-based devices that perform automated lab work, such as urine analysis for diabetics, have been developed and are already in use. The technology that we propose should eventually be merged with the latter sensor-based technology. This will enable the amount of medication dispensed to vary according to the patient s condition. References 1. J. Boyar, I. Damgård, and R. Peralta. Short non-interactive cryptographic proofs. Journal of Cryptology, 13: , J. Boyar, R. Peralta, and D. Pochuev. On the multiplicative complexity of Boolean functions over the basis (,, 1). Theoretical Computer Science, 235:43 57, 2000.

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

RelayHealth Legal Notices

RelayHealth Legal Notices Page 1 of 7 RelayHealth Legal Notices PRIVACY POLICY Revised August 2010 This policy only applies to those RelayHealth services for which you also must accept RelayHealth s Terms of Use. RelayHealth respects

More information

Body Sensor Network Security

Body Sensor Network Security 1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is

More information

ChARM EPCS. User Guide for Washington

ChARM EPCS. User Guide for Washington ChARM EPCS User Guide for Washington Table of Contents 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Abbreviations Symbols & Definitions ChARM EPCS Users and Roles Top Level Task Flow - How it works?

More information

Ordering New & Refill Prescriptions Online With Costco Mail Order

Ordering New & Refill Prescriptions Online With Costco Mail Order Ordering New & Refill Prescriptions Online With Costco Mail Order Last updated: 09/2018 Register an Account Visit: pharmacy.costco.com Click Sign In/Register and then Create Account to get started on your

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

Member Mail Order Helpful Hints, Reminders and Tools

Member Mail Order Helpful Hints, Reminders and Tools Member Mail Order Helpful Hints, Reminders and Tools Member Helpful Hints Using Aetna Rx Home Delivery is easy get started today Aetna Rx Home Delivery is a convenient, cost-effective way to obtain your

More information

OptumRx Quick Reference Guide

OptumRx Quick Reference Guide OptumRx Our website, www.optumrx.com is a fast, safe and secure way to manage your prescription benefits online. This quick reference guide illustrates how to use the tools and features that will help

More information

What is a Prescription Drug Monitoring Program?

What is a Prescription Drug Monitoring Program? What is a Prescription Drug Monitoring Program? A prescription drug monitoring program (PDMP) is a state program that collects controlled substance prescription records from dispensers (e.g., pharmacies)

More information

Electronic Prescribing of Controlled Substances (EPCS)

Electronic Prescribing of Controlled Substances (EPCS) Electronic Prescribing of Controlled Substances (EPCS) This document, as well as the software described in it, is provided under a software license agreement with STI Computer Services, Inc. Use of this

More information

2017_Privacy and Information Security_English_Content

2017_Privacy and Information Security_English_Content 2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited

More information

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). myvirtua.org Terms of Use PLEASE READ THESE TERMS OF USE CAREFULLY Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). Virtua has partnered with a company

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

Edition. MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide

Edition. MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide Edition 1 MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide i Table of Content OderConnect/InfoScriber Registration CH1 Pg.2 Sign In to MyAvatar CH2..Pg.10 Sync OrderConnect Password CH3.Pg.14 Client Look

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA AND  SECURITY. For Healthcare Organizations HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08

More information

Pseudonymization of Information for Privacy in E-Health (PIPE)

Pseudonymization of Information for Privacy in E-Health (PIPE) Pseudonymization of Information for Privacy in E-Health (PIPE) A Min Tjoa TU Wien & SBA One side of Privacy No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home,

More information

HIPAA Compliance & Privacy What You Need to Know Now

HIPAA  Compliance & Privacy What You Need to Know Now HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Building a Privacy Management Program

Building a Privacy Management Program Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Task: Design an ER diagram for that problem. Specify key attributes of each entity type.

Task: Design an ER diagram for that problem. Specify key attributes of each entity type. Q1. Consider the following set of requirements for a university database that is used to keep track of students transcripts. (10 marks) 1. The university keeps track of each student s name, student number,

More information

Thank you for using our clinical software Medinet. Together with Practice 2000, Medinet offers a complete solution for Medical Practitioners.

Thank you for using our clinical software Medinet. Together with Practice 2000, Medinet offers a complete solution for Medical Practitioners. Brief Guide Forewords Thank you for using our clinical software Medinet. Together with Practice 2000, Medinet offers a complete solution for Medical Practitioners. Medinet helps GPs to streamline clinical

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

LIFEWAY PREMARITAL INFORMATION FORM LIFEWAY REFERRAL INFORMATION

LIFEWAY PREMARITAL INFORMATION FORM LIFEWAY REFERRAL INFORMATION LIFEWAY PREMARITAL INFORMATION FORM Date: / / Name: First MI Last Date of Birth: / / Gender: M F Marital Status: Single Engaged Divorced Address: City State: Zip: Primary Contact Phone: Secondary Contact

More information

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2. Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.0 May 2012 Document Changes Date Version Author Description April 2009

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw REPRINT H03I15 PUBLISHED ON HBR.ORG MARCH 03, 2017 ARTICLE TECHNOLOGY The Potential for Blockchain to Transform Electronic Health Records by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw This article

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013 Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring

More information

Terms & Conditions. Privacy, Health & Copyright Policy

Terms & Conditions. Privacy, Health & Copyright Policy 1. PRIVACY Introduction Terms & Conditions Privacy, Health & Copyright Policy When you access our internet web site you agree to these terms and conditions. Bupa Wellness Pty Ltd ABN 67 145 612 951 ("Bupa

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions

General Data Protection Regulation Frequently Asked Questions (FAQ) General Questions General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Protecting Personal Health Information on Mobile and Portable Devices. Guidance from the Information and Privacy Commissioner of Ontario

Protecting Personal Health Information on Mobile and Portable Devices. Guidance from the Information and Privacy Commissioner of Ontario Protecting Personal Health Information on Mobile and Portable Devices Guidance from the Information and Privacy Commissioner of Ontario Why is the Protection of Personal Health Information (PHI) So Critical?

More information

An Overview of Secure Multiparty Computation

An Overview of Secure Multiparty Computation An Overview of Secure Multiparty Computation T. E. Bjørstad The Selmer Center Department of Informatics University of Bergen Norway Prøveforelesning for PhD-graden 2010-02-11 Outline Background 1 Background

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

INVESTIGATION REPORT , , ,

INVESTIGATION REPORT , , , INVESTIGATION REPORT 206-2018, 207-2018, 208-2018, 214-2018 ehealth Saskatchewan and University of Saskatchewan January 29, 2019 Summary: ehealth Saskatchewan (ehealth) detected that two medical residents

More information

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes Effective Date: 01/01/2014 Page 1 of 7 REVISION HISTORY Revision No. Revision Date Authors Description of Changes 1.0 11/04/2013 CISO Populate Into Standard Template APPROVED BY This Policy is established

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Complete document security

Complete document security DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important

More information

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By: HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Issues of Operating Systems Security

Issues of Operating Systems Security ECAI 2007 - International Conference Second Edition Electronics, Computers and Artificial Intelligence 29 th 30 th June, 2007, Piteşti, ROMÂNIA Issues of Operating Systems Security Academy of Economic

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

Part 11 Compliance SOP

Part 11 Compliance SOP 1.0 Commercial in Confidence 16-Aug-2006 1 of 14 Part 11 Compliance SOP Document No: SOP_0130 Prepared by: David Brown Date: 16-Aug-2006 Version: 1.0 1.0 Commercial in Confidence 16-Aug-2006 2 of 14 Document

More information

The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green

The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green The Australian Privacy Act An overview of the Australian Privacy Principles (APPs) Author: Paul Green INTRODUCTION If you are collecting or processing personal information then you are likely to be required

More information

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1 Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and

More information

Applying TVLA to Public Key Cryptographic Algorithms. Michael Tunstall Gilbert Goodwill

Applying TVLA to Public Key Cryptographic Algorithms. Michael Tunstall Gilbert Goodwill Applying TVLA to Public Key Cryptographic Algorithms Michael Tunstall Gilbert Goodwill Introduction Test Vector Leakage Assessment (TVLA) was proposed in 2012 Efficient in evaluating the presence of leakage

More information

Subject Access Request Policy

Subject Access Request Policy Subject Access Request Policy Effective Date: 25 th May 2018 Procedure for Access to Personal Information A. Rights of Access to Information There are two distinct rights of access to information held

More information

DigitalPersona Altus. Solution Guide

DigitalPersona Altus. Solution Guide DigitalPersona Altus Solution Guide Contents DigitalPersona... 1 DigitalPersona Altus Solution... 4 MODULAR SOLUTION CREATE-CONFIRM-CONTROL... 4 EXPERT SERVICES ASSESS-DESIGN-DEPLOY-SUPPORT... 5 DigitalPersona

More information

Registration on express-scripts.com and Mobile App Express Scripts Holding Company. All All Rights Reserved.

Registration on express-scripts.com and Mobile App Express Scripts Holding Company. All All Rights Reserved. Registration on express-scripts.com and Mobile App 2016 2015 2017 Express Scripts Holding Company. All All Rights Reserved. 1 Express Scripts Registration Members use express-scripts.com and the Express

More information

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks

More information

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11 VALIDATOR WHITE PAPER Addressing 21 cfr Part 11 Compliance Associates 1 1 INTRODUCTION 21 CFR Part 11 has been become a very large concern in the pharmaceutical industry as of late due to pressure from

More information

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management ehealth Workshop 28-29 Oct 2014 Middlesex University, London, UK Edeh Esther Omegero

More information

ComplianceQuest Support of Compliance to FDA 21 CFR Part 11Requirements WHITE PAPER. ComplianceQuest In-Depth Analysis and Review

ComplianceQuest Support of Compliance to FDA 21 CFR Part 11Requirements WHITE PAPER. ComplianceQuest In-Depth Analysis and Review ComplianceQuest Support of Compliance to FDA 21 CFR Part 11 WHITE PAPER ComplianceQuest In-Depth Analysis and Review ComplianceQuest Support of Compliance to FDA is the FDA guideline that defines the criteria

More information

HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD

HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD PURPOSE PRIVACY POLICY We respect your privacy and are committed to safeguarding your personally identifiable information or personal

More information

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy

More information

ATLANTICARE HEALTH-E YOU PATIENT PORTAL

ATLANTICARE HEALTH-E YOU PATIENT PORTAL the WE RESPECT YOUR PRIVACY WE PROTECT YOUR PERSONAL INFORMATION is designed to help you be a more involved partner in your own healthcare. The portal makes it easy to contact your AtlantiCare team of

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

LiiV Handbook. Version 2.1. Supplier information in the VARA register. This handbook describes pharmaceutical companies work in LiiV

LiiV Handbook. Version 2.1. Supplier information in the VARA register. This handbook describes pharmaceutical companies work in LiiV LiiV Handbook Supplier information in the VARA register Version 2.1 This handbook describes pharmaceutical companies work in LiiV Contents 1. Introduction... 4 1.1 Information owner... 4 2. How does LiiV

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean:

A Mathematical Proof. Zero Knowledge Protocols. Interactive Proof System. Other Kinds of Proofs. When referring to a proof in logic we usually mean: A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms. Zero Knowledge Protocols 3. Each statement is derived via the derivation rules.

More information

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16)

Zero Knowledge Protocols. c Eli Biham - May 3, Zero Knowledge Protocols (16) Zero Knowledge Protocols c Eli Biham - May 3, 2005 442 Zero Knowledge Protocols (16) A Mathematical Proof When referring to a proof in logic we usually mean: 1. A sequence of statements. 2. Based on axioms.

More information

Addendum # 2 STATE OF LOUISIANA DIVISION OF ADMINISTRATION OFFICE OF GROUP BENEFITS (OGB) NOTICE OF INTENT TO CONTRACT (NIC) FOR

Addendum # 2 STATE OF LOUISIANA DIVISION OF ADMINISTRATION OFFICE OF GROUP BENEFITS (OGB) NOTICE OF INTENT TO CONTRACT (NIC) FOR Addendum # 2 STATE OF LOUISIANA DIVISION OF ADMINISTRATION OFFICE OF GROUP BENEFITS (OGB) NOTICE OF INTENT TO CONTRACT (NIC) FOR PHARMACY BENEFIT MANAGEMENT (PBM) SERVICES ISSUED December 11, 2009 1 REVISED

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS MSP SOLUTIONS BY BARRACUDA HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and Intronis Cloud Backup and

More information

AUTHORIZATION TO RELEASE HEALTH INFORMATION

AUTHORIZATION TO RELEASE HEALTH INFORMATION Request Completed Health Information Management AUTHORIZATION TO RELEASE HEALTH INFORMATION Completion of this form authorizes the use and/or disclosure (release) of individually identifiable health information,

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Chmura Orthodontics ( Practice ) understands the important of keeping your personal information private. Personal information includes: your name, postal address, e-mail address,

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

We will only ask you for information which is absolutely necessary for us to help you and that which you have consented to providing,

We will only ask you for information which is absolutely necessary for us to help you and that which you have consented to providing, Privacy Policy Here at frank. we understand that your information is valuable to you and the trust you place in us to look after it is not something we take for granted. The policy outlined below outlines

More information

OptimiseRx Prescribers User Guide for EMIS Web

OptimiseRx Prescribers User Guide for EMIS Web PRODUCT OVERVIEW: OptimiseRx OptimiseRx Fully integrated with the patient record to enable the delivery of prescribing best practice and to optimise cost savings. 2016 First Databank Europe Ltd. A subsidiary

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

Olympia Family Medicine 5949 Harbour Park Drive Midlothian, VA 23112

Olympia Family Medicine 5949 Harbour Park Drive Midlothian, VA 23112 Olympia Family Medicine 5949 Harbour Park Drive Midlothian, VA 23112 Patient Registration Date Name DOB Age SSN Sex: M F Address City State Zip Code Home Phone # Cell Phone # Work Phone Occupation Employer

More information

SHS Annual Information Privacy and Security Training

SHS Annual Information Privacy and Security Training SHS Annual Information Privacy and Security Training Purpose for Training Samaritan Health Services has created the following training to meet the annual regulatory requirements for education related to

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security Outline ZKIP Other IP CPSC 467b: Cryptography and Computer Security Lecture 19 Michael J. Fischer Department of Computer Science Yale University March 31, 2010 Michael J. Fischer CPSC 467b, Lecture 19

More information

Privacy Policy on the Responsibilities of Third Party Service Providers

Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that

More information

Training Guide for Alabama Practitioners and Pharmacists. Alabama Department of Public Health Prescription Drug Monitoring Program

Training Guide for Alabama Practitioners and Pharmacists. Alabama Department of Public Health Prescription Drug Monitoring Program Training Guide for Alabama Practitioners and Pharmacists Alabama Department of Public Health Prescription Drug Monitoring Program March 2015 Contents Contents 1 Document Overview... 2 Purpose and Contents...

More information

Privacy Challenges in Big Data and Industry 4.0

Privacy Challenges in Big Data and Industry 4.0 Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/

More information

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com.

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com. Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic

More information

Data Management Unit, V3.1 University of Pennsylvania Treatment Research Center, 2010 Page 2

Data Management Unit, V3.1 University of Pennsylvania Treatment Research Center, 2010 Page 2 Welcome to the Data Entry System User s Manual. This manual will cover all of the steps necessary for you to successfully navigate and operate the Data Management Unit s Web based data entry system. We

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Care360 Mobile Frequently Asked Questions

Care360 Mobile Frequently Asked Questions Care360 Mobile Frequently Asked Questions Table of Contents Care360 for Mobile Devices... 3 What mobile devices can run Care360?... 3 How do I upgrade one of the supported devices to ios 9.x?... 3 How

More information

Compliance Matrix for 21 CFR Part 11: Electronic Records

Compliance Matrix for 21 CFR Part 11: Electronic Records Compliance Matrix for 21 CFR Part 11: Electronic Records Philip E. Plantz, PhD, Applications Manager David Kremer, Senior Software Engineer Application Note SL-AN-27 Revision B Provided By: Microtrac,

More information

1 A Tale of Two Lovers

1 A Tale of Two Lovers CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Dec. 12, 2006 Lecture Notes 19 (expanded): Secure Two-Party Computation Recommended Reading. Goldreich Volume II 7.2.2, 7.3.2, 7.3.3.

More information