SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
On Privacy in Medical Services
with Electronic Health Records
SiHIS 2009, IMIA WG 4, Hiroshima, Japan
Sebastian Haas
Günter Müller
University of Freiburg, Germany
Sven Wohlgemuth
Isao Echizen
Noboru Sonehara
National Institute of Informatics, Japan
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
1. Medical Systems and Electronic Health Records
2. Shift to a new Health Record Scenario
3. The Patient as Target
4. Usage Control: Data Provenance by Digital Watermarking
5. Conclusion
Agenda
1
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
Various medical systems used to support treatment.
Systems use electronic health records (EHR) about the patient.
Many EHRs at different locations.
1.	Medical	Systems	and	Electronic	Health	Records
2
Hospital
Laboratory
Examination
Dentist
Pharmacy
Patient
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
2.	Shift	to	a	new	Health	Record	Scenario	(1/2)	
3
Castle Marketplace Metropolis
Mainframe Internet
De-
Perimetrization
Insiders and
Outsiders
Server-based
Security
Client-based
Security
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
All data about the patient stored in one location:
A central EHR
Patient is in charge of this data.
2.	Shift	to	a	new	Health	Record	Scenario	(2/2)
4
Patient’s data is stored in
many medical systems.
Each medical system is in
charge of patient’s data.
Hospital
Laboratory
Examination
Dentist
Pharmacy
Current scenario New scenario
Patient
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
Patient “inherits” responsibility and risk.
Dishonest parties may force patient to
reveal medical data.
Ø Privacy Problem
How can the patient be protected
from being forced to reveal
medical data?
3.	The	Patient	as	a	Target
5
Hospital
Examination
Dentist
Pharmacy
Laboratory
Insurance
Advertiser
Employer
Patient
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
ReactivePreventive
4.	Usage	Control:	Data	Provenance	by	Digital	Watermarking
6
Mechanisms &
Methods
Before the
execution
During the
execution
After the
execution
Policies
- Process Rewriting
- Workflow Patterns
- Vulnerability Analysis
- Extended Privacy
Definition
Tools(ExPDT)
- Model Reconstruction
- Audits / Forensics
- Architectures for Data
Provenance
- Execution Monitoring
- Unlinkable Delegation
of Rights
Research collaboration
between University of
Freiburg and NII
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
Data provenance
– Information to determine the derivation history
In an audit, data provenance can be used to restore the information flow.
4.	Data	Provenance	in	EHR
7
Example
Patient
EmployerLaboratory
Medical
Data
Patient
Advertiser
Medical
Data
Patient
Advertiser
Employer
Medical
Data
Patient
Advertiser
Laboratory
Employer
Medical
Data
Patient
Advertiser
Laboratory
Data Provenance
AdvertiserEmployer
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
Watermarking is a method to bind provenance information as a tag to data.
The EHR/Medical system must enforce that
– disclosed data is tagged with updated provenance information
– provenance information is authentic.
4.	Digital	Watermarking	Method
8
EHR/Medical system
Data Data consumer
(e.g. Laboratory)
Watermarking
Service
2) Fetch data
3) Apply tag
4) Deliver tagged data
Steps of a disclosure:
1) Access request
Data provider
(e.g. Advertiser)
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
4.	Digital	Watermarking Scheme
9
Data provenance information
– Linking identities of data provider and data consumer with access to medical data.
Detection by the patient via delegated access rights for medical data.
Data provider Data consumer
Apply Tag
Patient Data provider
Verify Tag
Data consumer
Patient
Advertiser
Laboratory
Patient
(rights)
Advertiser Laboratory
Patient
(rights)
Patient
Advertiser
Laboratory
Advertiser
Laboratory
Patient
Advertiser
LaboratoryLaboratory Advertiser
寿
Laboratory
Advertiser
寿
On	Privacy in	Medical Services	with Electronic	Health	Records
IIG	- TelematicsNational Institute ofInformatics
Patient becomes a weak spot
Data provenance can be used as
basis for accountability
Patient can prove that unwanted
disclosures have occurred
5.	Conclusion
10
Hospital
Examination
Dentist
Pharmacy
Laboratory
Insurance
Advertiser
Employer
Patient
ありがとうございました
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic medical record for patients
Electronic medical record for patientsElectronic medical record for patients
Electronic medical record for patientsRailwire
 
Loclisation of openEHR in Japan and nation-wide EHR project
Loclisation of openEHR in Japan and nation-wide EHR projectLoclisation of openEHR in Japan and nation-wide EHR project
Loclisation of openEHR in Japan and nation-wide EHR projectopenEHR-Japan
 
Balancing privacy and public use of health data
Balancing privacy and public use of health dataBalancing privacy and public use of health data
Balancing privacy and public use of health dataShinji Kobayashi
 
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar PharmaLedger
 
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12Santosh Malpani
 
Electronic medical record for Doctors
Electronic medical record for DoctorsElectronic medical record for Doctors
Electronic medical record for DoctorsRailwire
 
EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013IMI-EMIF
 
3d printing and biofabrication
3d printing and biofabrication3d printing and biofabrication
3d printing and biofabricationErik Vollebregt
 
Review of Interoperability techniques in data acquisition of wireless ECG dev...
Review of Interoperability techniques in data acquisition of wireless ECG dev...Review of Interoperability techniques in data acquisition of wireless ECG dev...
Review of Interoperability techniques in data acquisition of wireless ECG dev...iosrjce
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Alexander Decker
 
Revolutionizing Healthcare Through Clinical Informatics
Revolutionizing Healthcare Through Clinical InformaticsRevolutionizing Healthcare Through Clinical Informatics
Revolutionizing Healthcare Through Clinical InformaticsAnthony Oloni
 
Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security Erik Vollebregt
 
Transparency under the new MDR and IVDR
Transparency under the new MDR and IVDRTransparency under the new MDR and IVDR
Transparency under the new MDR and IVDRErik Vollebregt
 
Adopting Hit Chart Pack2006
Adopting Hit Chart Pack2006Adopting Hit Chart Pack2006
Adopting Hit Chart Pack2006FNian
 
Health information system security
Health information system securityHealth information system security
Health information system securitykristinleighclark
 

Was ist angesagt? (20)

Electronic medical record for patients
Electronic medical record for patientsElectronic medical record for patients
Electronic medical record for patients
 
Loclisation of openEHR in Japan and nation-wide EHR project
Loclisation of openEHR in Japan and nation-wide EHR projectLoclisation of openEHR in Japan and nation-wide EHR project
Loclisation of openEHR in Japan and nation-wide EHR project
 
Balancing privacy and public use of health data
Balancing privacy and public use of health dataBalancing privacy and public use of health data
Balancing privacy and public use of health data
 
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
IoT Medical Devices | Topic #3 of PharmaLedger's 2nd Open Webinar
 
Quæfacta GCCCF May 22th, 2019
Quæfacta GCCCF May 22th, 2019Quæfacta GCCCF May 22th, 2019
Quæfacta GCCCF May 22th, 2019
 
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12
Rssdi role of Electronic Medical Record in Diabetes Care 27.10.12
 
EMR vs EHR
EMR vs EHREMR vs EHR
EMR vs EHR
 
Ehealth
EhealthEhealth
Ehealth
 
Electronic medical record for Doctors
Electronic medical record for DoctorsElectronic medical record for Doctors
Electronic medical record for Doctors
 
EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013EMIF_tranSMART meeting Paris_7 November 2013
EMIF_tranSMART meeting Paris_7 November 2013
 
ECDC projects and collaborations on digital surveillance
ECDC projects and collaborations on digital surveillanceECDC projects and collaborations on digital surveillance
ECDC projects and collaborations on digital surveillance
 
3d printing and biofabrication
3d printing and biofabrication3d printing and biofabrication
3d printing and biofabrication
 
Review of Interoperability techniques in data acquisition of wireless ECG dev...
Review of Interoperability techniques in data acquisition of wireless ECG dev...Review of Interoperability techniques in data acquisition of wireless ECG dev...
Review of Interoperability techniques in data acquisition of wireless ECG dev...
 
The Icelandic Cancer Registry ICR
The Icelandic Cancer Registry ICRThe Icelandic Cancer Registry ICR
The Icelandic Cancer Registry ICR
 
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...Exploiting multimodal biometrics in e privacy scheme for electronic health re...
Exploiting multimodal biometrics in e privacy scheme for electronic health re...
 
Revolutionizing Healthcare Through Clinical Informatics
Revolutionizing Healthcare Through Clinical InformaticsRevolutionizing Healthcare Through Clinical Informatics
Revolutionizing Healthcare Through Clinical Informatics
 
Medical device data protection and security
Medical device data protection and security Medical device data protection and security
Medical device data protection and security
 
Transparency under the new MDR and IVDR
Transparency under the new MDR and IVDRTransparency under the new MDR and IVDR
Transparency under the new MDR and IVDR
 
Adopting Hit Chart Pack2006
Adopting Hit Chart Pack2006Adopting Hit Chart Pack2006
Adopting Hit Chart Pack2006
 
Health information system security
Health information system securityHealth information system security
Health information system security
 

Andere mochten auch

Грипп и пневмония
Грипп и пневмонияГрипп и пневмония
Грипп и пневмонияsk1ll
 
Создание рефлексивно-гуманистической образовательной среды
Создание рефлексивно-гуманистической образовательной средыСоздание рефлексивно-гуманистической образовательной среды
Создание рефлексивно-гуманистической образовательной средыTaisiya Mukii
 
Research paper UAVs2012
Research paper UAVs2012Research paper UAVs2012
Research paper UAVs2012Jan Miller
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
معلومات عن الهاكر وطرق الحمايه
معلومات عن الهاكر وطرق الحمايهمعلومات عن الهاكر وطرق الحمايه
معلومات عن الهاكر وطرق الحمايهhakmhamdy
 
English vocabulary
English vocabularyEnglish vocabulary
English vocabularygguzman76
 
2016ProductCatalogcolorFinalProductionCatalog
2016ProductCatalogcolorFinalProductionCatalog2016ProductCatalogcolorFinalProductionCatalog
2016ProductCatalogcolorFinalProductionCatalogRobert J Rodrick Jr.
 
Modern Nanostructures for Diagnosis and Treatment
Modern Nanostructures for Diagnosis and TreatmentModern Nanostructures for Diagnosis and Treatment
Modern Nanostructures for Diagnosis and Treatmenttabirsir
 
Nano carriers in cancer treatment
Nano carriers in cancer treatment Nano carriers in cancer treatment
Nano carriers in cancer treatment venkatesh swamy
 
Drug delivery via nanocapsules
Drug delivery via nanocapsules Drug delivery via nanocapsules
Drug delivery via nanocapsules tabirsir
 

Andere mochten auch (18)

Грипп и пневмония
Грипп и пневмонияГрипп и пневмония
Грипп и пневмония
 
THESIS 2013 copy
THESIS 2013 copyTHESIS 2013 copy
THESIS 2013 copy
 
Создание рефлексивно-гуманистической образовательной среды
Создание рефлексивно-гуманистической образовательной средыСоздание рефлексивно-гуманистической образовательной среды
Создание рефлексивно-гуманистической образовательной среды
 
BS ABM 2014
BS ABM 2014BS ABM 2014
BS ABM 2014
 
2 Recommendation letters
2 Recommendation letters2 Recommendation letters
2 Recommendation letters
 
Brazil3- Forbes
Brazil3- ForbesBrazil3- Forbes
Brazil3- Forbes
 
Research paper UAVs2012
Research paper UAVs2012Research paper UAVs2012
Research paper UAVs2012
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
karpets2015
karpets2015karpets2015
karpets2015
 
Conditional 0 and 1
Conditional 0 and 1Conditional 0 and 1
Conditional 0 and 1
 
معلومات عن الهاكر وطرق الحمايه
معلومات عن الهاكر وطرق الحمايهمعلومات عن الهاكر وطرق الحمايه
معلومات عن الهاكر وطرق الحمايه
 
English vocabulary
English vocabularyEnglish vocabulary
English vocabulary
 
2016ProductCatalogcolorFinalProductionCatalog
2016ProductCatalogcolorFinalProductionCatalog2016ProductCatalogcolorFinalProductionCatalog
2016ProductCatalogcolorFinalProductionCatalog
 
Modern Nanostructures for Diagnosis and Treatment
Modern Nanostructures for Diagnosis and TreatmentModern Nanostructures for Diagnosis and Treatment
Modern Nanostructures for Diagnosis and Treatment
 
Cartel educativo
Cartel educativoCartel educativo
Cartel educativo
 
Aquasomes
AquasomesAquasomes
Aquasomes
 
Nano carriers in cancer treatment
Nano carriers in cancer treatment Nano carriers in cancer treatment
Nano carriers in cancer treatment
 
Drug delivery via nanocapsules
Drug delivery via nanocapsules Drug delivery via nanocapsules
Drug delivery via nanocapsules
 

Ähnlich wie On Privacy in Medical Services with Electronic Health Records

Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 
Computer based patient record for anaesthesia
Computer based patient record for anaesthesiaComputer based patient record for anaesthesia
Computer based patient record for anaesthesiaDr. Ravikiran H M Gowda
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
IoE in Clinical Trials
IoE in Clinical TrialsIoE in Clinical Trials
IoE in Clinical TrialsCRF Health
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...ijsptm
 
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...IRJET Journal
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabitha Devu
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Arete-Zoe, LLC
 
Decision Support System for clinical practice created on the basis of the Un...
Decision Support System for clinical practice created on the basis of  the Un...Decision Support System for clinical practice created on the basis of  the Un...
Decision Support System for clinical practice created on the basis of the Un...blejyants
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemIJTET Journal
 
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?VPH in Future Healthcare. Where Will We Be in 10 Years from Now?
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?Plan de Calidad para el SNS
 
Does Greece have an eHealth strategy plan?
Does Greece have an eHealth strategy plan? Does Greece have an eHealth strategy plan?
Does Greece have an eHealth strategy plan? eHealth Forum
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Abhijit Mukherji
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...Massimiliano Masi
 

Ähnlich wie On Privacy in Medical Services with Electronic Health Records (20)

Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Computer based patient record for anaesthesia
Computer based patient record for anaesthesiaComputer based patient record for anaesthesia
Computer based patient record for anaesthesia
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
IoE in Clinical Trials
IoE in Clinical TrialsIoE in Clinical Trials
IoE in Clinical Trials
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
 
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...
IRJET-Cloud based Patient Referral System with RFID Based Clinical Informatio...
 
Babithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics TechnologyBabithas Notes on unit-2 Health/Nursing Informatics Technology
Babithas Notes on unit-2 Health/Nursing Informatics Technology
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...Why merging medical records, hospital reports, and clinical trial data is a v...
Why merging medical records, hospital reports, and clinical trial data is a v...
 
Rdif
RdifRdif
Rdif
 
Decision Support System for clinical practice created on the basis of the Un...
Decision Support System for clinical practice created on the basis of  the Un...Decision Support System for clinical practice created on the basis of  the Un...
Decision Support System for clinical practice created on the basis of the Un...
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Clean Clinical Trial
Clean Clinical Trial Clean Clinical Trial
Clean Clinical Trial
 
Secure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care SystemSecure Transmission of Patient Physiological Information in Point of Care System
Secure Transmission of Patient Physiological Information in Point of Care System
 
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?VPH in Future Healthcare. Where Will We Be in 10 Years from Now?
VPH in Future Healthcare. Where Will We Be in 10 Years from Now?
 
Does Greece have an eHealth strategy plan?
Does Greece have an eHealth strategy plan? Does Greece have an eHealth strategy plan?
Does Greece have an eHealth strategy plan?
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)
 
Dhruti
DhrutiDhruti
Dhruti
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...
 

Mehr von Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementSven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with BlockchainSven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable SecuritySven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSven Wohlgemuth
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySven Wohlgemuth
 

Mehr von Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 

Kürzlich hochgeladen

EMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionEMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionJannelPomida
 
Incentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationIncentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationpratiksha ghimire
 
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfUnderstanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfSasikiranMarri
 
arpita 1-1.pptx management of nursing service and education
arpita 1-1.pptx management of nursing service and educationarpita 1-1.pptx management of nursing service and education
arpita 1-1.pptx management of nursing service and educationNursing education
 
Clinical Education Presentation at Accelacare
Clinical Education Presentation at AccelacareClinical Education Presentation at Accelacare
Clinical Education Presentation at Accelacarepablor40
 
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书rnrncn29
 
unit-3 blood product B.Pharma 3rd year .pptx
unit-3 blood product B.Pharma 3rd year .pptxunit-3 blood product B.Pharma 3rd year .pptx
unit-3 blood product B.Pharma 3rd year .pptxBkGupta21
 
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...Oleg Kshivets
 
lupus quiz.pptx for knowing lupus thoroughly
lupus quiz.pptx for knowing lupus thoroughlylupus quiz.pptx for knowing lupus thoroughly
lupus quiz.pptx for knowing lupus thoroughlyRitasman Baisya
 
ANTIGEN- SECTION IMMUNOLOGY DEPARTMENT OF MICROBIOLOGY
ANTIGEN- SECTION IMMUNOLOGY  DEPARTMENT OF MICROBIOLOGYANTIGEN- SECTION IMMUNOLOGY  DEPARTMENT OF MICROBIOLOGY
ANTIGEN- SECTION IMMUNOLOGY DEPARTMENT OF MICROBIOLOGYDrmayuribhise
 
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardAdvance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardVITASAuthor
 
Professional Ear Wax Cleaning Services for Your Home
Professional Ear Wax Cleaning Services for Your HomeProfessional Ear Wax Cleaning Services for Your Home
Professional Ear Wax Cleaning Services for Your HomeEarwax Doctor
 
Back care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationBack care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationpratiksha ghimire
 
EHR Market Growth is The Boom Over - Jasper Colin
EHR Market Growth is The Boom Over - Jasper ColinEHR Market Growth is The Boom Over - Jasper Colin
EHR Market Growth is The Boom Over - Jasper ColinJasper Colin
 
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...The Lifesciences Magazine
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...LinshaLichu1
 
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdfeurohealthleaders
 
Mobile Health And Apps (mhealth) How to design Application for medical App.pptx
Mobile Health And Apps (mhealth) How to design Application for medical App.pptxMobile Health And Apps (mhealth) How to design Application for medical App.pptx
Mobile Health And Apps (mhealth) How to design Application for medical App.pptxMahesh Chopra
 
Artificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsArtificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsParag Kothawade
 

Kürzlich hochgeladen (20)

EMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionEMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass Destruction
 
Incentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationIncentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentation
 
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfUnderstanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
 
Coping with Childhood Cancer - How Does it Hurt Today
Coping with Childhood Cancer - How Does it Hurt TodayCoping with Childhood Cancer - How Does it Hurt Today
Coping with Childhood Cancer - How Does it Hurt Today
 
arpita 1-1.pptx management of nursing service and education
arpita 1-1.pptx management of nursing service and educationarpita 1-1.pptx management of nursing service and education
arpita 1-1.pptx management of nursing service and education
 
Clinical Education Presentation at Accelacare
Clinical Education Presentation at AccelacareClinical Education Presentation at Accelacare
Clinical Education Presentation at Accelacare
 
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
 
unit-3 blood product B.Pharma 3rd year .pptx
unit-3 blood product B.Pharma 3rd year .pptxunit-3 blood product B.Pharma 3rd year .pptx
unit-3 blood product B.Pharma 3rd year .pptx
 
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...
Local Advanced Esophageal Cancer (T3-4N0-2M0): Artificial Intelligence, Syner...
 
lupus quiz.pptx for knowing lupus thoroughly
lupus quiz.pptx for knowing lupus thoroughlylupus quiz.pptx for knowing lupus thoroughly
lupus quiz.pptx for knowing lupus thoroughly
 
ANTIGEN- SECTION IMMUNOLOGY DEPARTMENT OF MICROBIOLOGY
ANTIGEN- SECTION IMMUNOLOGY  DEPARTMENT OF MICROBIOLOGYANTIGEN- SECTION IMMUNOLOGY  DEPARTMENT OF MICROBIOLOGY
ANTIGEN- SECTION IMMUNOLOGY DEPARTMENT OF MICROBIOLOGY
 
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardAdvance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
 
Professional Ear Wax Cleaning Services for Your Home
Professional Ear Wax Cleaning Services for Your HomeProfessional Ear Wax Cleaning Services for Your Home
Professional Ear Wax Cleaning Services for Your Home
 
Back care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationBack care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentation
 
EHR Market Growth is The Boom Over - Jasper Colin
EHR Market Growth is The Boom Over - Jasper ColinEHR Market Growth is The Boom Over - Jasper Colin
EHR Market Growth is The Boom Over - Jasper Colin
 
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...
 
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Denmark's Healthcare.pdf
 
Mobile Health And Apps (mhealth) How to design Application for medical App.pptx
Mobile Health And Apps (mhealth) How to design Application for medical App.pptxMobile Health And Apps (mhealth) How to design Application for medical App.pptx
Mobile Health And Apps (mhealth) How to design Application for medical App.pptx
 
Artificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsArtificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid Dynamics
 

On Privacy in Medical Services with Electronic Health Records

  • 1. On Privacy in Medical Services with Electronic Health Records SiHIS 2009, IMIA WG 4, Hiroshima, Japan Sebastian Haas Günter Müller University of Freiburg, Germany Sven Wohlgemuth Isao Echizen Noboru Sonehara National Institute of Informatics, Japan
  • 2. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics 1. Medical Systems and Electronic Health Records 2. Shift to a new Health Record Scenario 3. The Patient as Target 4. Usage Control: Data Provenance by Digital Watermarking 5. Conclusion Agenda 1
  • 3. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics Various medical systems used to support treatment. Systems use electronic health records (EHR) about the patient. Many EHRs at different locations. 1. Medical Systems and Electronic Health Records 2 Hospital Laboratory Examination Dentist Pharmacy Patient
  • 4. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics 2. Shift to a new Health Record Scenario (1/2) 3 Castle Marketplace Metropolis Mainframe Internet De- Perimetrization Insiders and Outsiders Server-based Security Client-based Security
  • 5. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics All data about the patient stored in one location: A central EHR Patient is in charge of this data. 2. Shift to a new Health Record Scenario (2/2) 4 Patient’s data is stored in many medical systems. Each medical system is in charge of patient’s data. Hospital Laboratory Examination Dentist Pharmacy Current scenario New scenario Patient
  • 6. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics Patient “inherits” responsibility and risk. Dishonest parties may force patient to reveal medical data. Ø Privacy Problem How can the patient be protected from being forced to reveal medical data? 3. The Patient as a Target 5 Hospital Examination Dentist Pharmacy Laboratory Insurance Advertiser Employer Patient
  • 7. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics ReactivePreventive 4. Usage Control: Data Provenance by Digital Watermarking 6 Mechanisms & Methods Before the execution During the execution After the execution Policies - Process Rewriting - Workflow Patterns - Vulnerability Analysis - Extended Privacy Definition Tools(ExPDT) - Model Reconstruction - Audits / Forensics - Architectures for Data Provenance - Execution Monitoring - Unlinkable Delegation of Rights Research collaboration between University of Freiburg and NII
  • 8. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics Data provenance – Information to determine the derivation history In an audit, data provenance can be used to restore the information flow. 4. Data Provenance in EHR 7 Example Patient EmployerLaboratory Medical Data Patient Advertiser Medical Data Patient Advertiser Employer Medical Data Patient Advertiser Laboratory Employer Medical Data Patient Advertiser Laboratory Data Provenance AdvertiserEmployer
  • 9. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics Watermarking is a method to bind provenance information as a tag to data. The EHR/Medical system must enforce that – disclosed data is tagged with updated provenance information – provenance information is authentic. 4. Digital Watermarking Method 8 EHR/Medical system Data Data consumer (e.g. Laboratory) Watermarking Service 2) Fetch data 3) Apply tag 4) Deliver tagged data Steps of a disclosure: 1) Access request Data provider (e.g. Advertiser)
  • 10. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics 4. Digital Watermarking Scheme 9 Data provenance information – Linking identities of data provider and data consumer with access to medical data. Detection by the patient via delegated access rights for medical data. Data provider Data consumer Apply Tag Patient Data provider Verify Tag Data consumer Patient Advertiser Laboratory Patient (rights) Advertiser Laboratory Patient (rights) Patient Advertiser Laboratory Advertiser Laboratory Patient Advertiser LaboratoryLaboratory Advertiser 寿 Laboratory Advertiser 寿
  • 11. On Privacy in Medical Services with Electronic Health Records IIG - TelematicsNational Institute ofInformatics Patient becomes a weak spot Data provenance can be used as basis for accountability Patient can prove that unwanted disclosures have occurred 5. Conclusion 10 Hospital Examination Dentist Pharmacy Laboratory Insurance Advertiser Employer Patient ありがとうございました Thank you