tailieunhanh - Bài giảng Bảo mật cơ sở dữ liệu: Security methods for statistical databases - Trần Thị Kim Chi
Bài giảng "Bảo mật cơ sở dữ liệu: Security methods for statistical databases" trình bày các nội dung: Laws, HIPAA compliance, types of statistical databases, security methods, query set restriction, microaggregation, output perturbation,. . | Security Methods for Statistical Databases Introduction Statistical Databases containing medical information are often used for research Some of the data is protected by laws to help protect the privacy of the patient Proper security precautions must be implemented to comply with laws and respect the sensitivity of the data Accuracy vs. Confidentiality Accuracy – Researchers want to extract accurate and meaningful data Confidentiality – Patients, laws and database administrators want to maintain the privacy of patients and the confidentiality of their information Laws Health Insurance Portability and Accountability Act – HIPAA (Privacy Rule) Covered organizations must comply by April 14, 2003 Designed to improve efficiency of healthcare system by using electronic exchange of data and maintaining security Covered entities (health plans, healthcare clearinghouses, healthcare providers) may not use or disclose protected information except as permitted or required Privacy Rule establishes a “minimum necessary standard” for the purpose of making covered entities evaluate their current regulations and security precautions 4 A covered entity may always use or disclose for research purposes health information which has been de-identified without regard to the provisions below. De-identified: HIPAA Compliance Companies offer 3rd Party Certification of covered entities Such companies will check your company and associating companies for compliance with HIPAA Can help with rapid implementation and compliance to HIPAA regulations Types of Statistical Databases Static – a static database is made once and never changes Example: . Census Dynamic – changes continuously to reflect real-time data Example: most online research databases Security Methods Access Restriction Query Set Restriction Microaggregation Data Perturbation Output Perturbation Auditing Random Sampling Access Restriction Databases normally have different access levels for different types of users User ID and . | Security Methods for Statistical Databases Introduction Statistical Databases containing medical information are often used for research Some of the data is protected by laws to help protect the privacy of the patient Proper security precautions must be implemented to comply with laws and respect the sensitivity of the data Accuracy vs. Confidentiality Accuracy – Researchers want to extract accurate and meaningful data Confidentiality – Patients, laws and database administrators want to maintain the privacy of patients and the confidentiality of their information Laws Health Insurance Portability and Accountability Act – HIPAA (Privacy Rule) Covered organizations must comply by April 14, 2003 Designed to improve efficiency of healthcare system by using electronic exchange of data and maintaining security Covered entities (health plans, healthcare clearinghouses, healthcare providers) may not use or disclose protected information except as permitted or required Privacy Rule .
đang nạp các trang xem trước