SlideShare a Scribd company logo
1 of 1
Download to read offline
Low-Level Operations (LLO)
Data Management Interfaces (DMI)
Medical Record
System
Medical Record
System
Medical Record
System
Medical Record
System
Goals and Approach
CHINO Process Definition and Execution
Medical Record Sharing
Jovan Stevovic, Fabio Casati, Bilal Farraj
Dep. of Information Engineering and Computer Science
University of Trento, Italy
icons by http://dryicons.com
EHR
Electronic Health
Record System
The CHINO Business Process and Policy Execution
Framework
Healthcare services = joint work of many
organizations
Develop a system to easily share medical records while satisfying security,
privacy and business requirements
Compliance-Aware Cross-Organization
Medical Record Sharing
Record
Store
Data Filtering
PEP
Metadata
Registry
Business Rules
Manager
Access Rights
PEP
Shared Process Execution Environment
The main modeler components are:
A: List of all processes
B: The Modeling framework
C: List of the Custom CHINO elements
D: Configuration of the custom elements
DMI and LLO implemented using
SOA and EDA architectural patterns
Some of the used tools: Activiti BPM
open source engine, Mule ESB,
MySQL, ebXML Registry
Security policies
¡ Access control
¡ Encryption strategy
¡ Data storage location
Requirements and Case Study
Jun Li, Hamid R. Motahari-Nezhad
Hewlett-Packard Laboratories
Palo Alto, California, USA
Giampaolo Armellin
CRG - Centro Ricerche GPI
Trento, Italy
1. Identification of Business
Requirements
2. Identification of Compliance
Requirements
3. Definition of Compliance-Aware Data
Management Scenarios
4. Definition of Executable Processes and
Policies
5. Deployment and Execution inside Runtime
Environment
Chief
Information
Officer
Business
Analyst
Business
Analyst and
Developer
Developer
Chief
Compliance
Officer
Patient
Doctor
Specialist
0: specifies/accepts sharing
policies1: problem
description
2: consultation
request
4: request records
3: consultation request
7: Records / request
denied
6: retrieve record from
external store
5: check policies
Doctor-consultation scenario in Italy
EHR
Electronic Health
Record System
Patient
Doctor
Specialist
6: approve/ deny
1: problem
description
2: consultation
request
4: request records
3: consultation request
7: Records / request
denied
Doctor-consultation scenario in UK
5: request approval
Privacy policies
¡ Data owners
¡ Policy enforcement points
¡ Purposes of use of data
Business specific requirements
¡ EHR standards
¡ Organizations’ requirements
The CHINO Methodology
•  Interactions
•  Business req.
Descriptions of
services
•  Security req.
•  Privacy req.
Compliance
requirements
High-level representation describing the
interactions annotated with privacy, security
and compliance req.
input output input output
output
Executable compliance-aware business
processes and rules.
output
Compliance-aware medical record sharing
output
It is challenging due to security, privacy and
business requirements
The Process Modeling and Policy Definition
Framework
Enable organizations to define their own data management processes and
policies that manage their data and share them with others
pushRecord getRecordgrantRightspushMetadata
The CHINO framework elements:
¡ Two categories of data:
•  Records: detailed and privacy sensitive
information
•  Metadata: describes Records
¡ Rules:
•  Access Right Rules: defines access control
over Metadata and Records
•  Privacy Filtering Rules: fine-grained data
filtering mechanism for XML or HL7 data
¡ Data Management Interfaces (DMI):
•  pushRecord, getRecord, grantRights to
manage Records and Metadata
¡ Modeling Elements:
•  BPMN 2.0 elements: supported by the Activiti
engine.
•  Custom CHINO BPMN elements: to facilitate
access to LLO and interaction with external
organizations trough DMI.
¡ Low Level Operations (LLO):
•  pushRecord, getRecord, grantRights to access
to internal components
OpenMRS + CHINO integration
1.  Doctor-consultation module for OpenMRS
2.  Integrated with CHINO
3.  2 sets of processes to demonstrate cross-
regulation record sharing.
ValidationValidation
SpecialistDoctor
The custom CHINO tasks are
mapped on Low-Level Operations
over data and policies
Record requests trigger record
owners’ processes and policies
From requirements collection to process and policy execution
demo
Ongoing study with 2 Groups
1.  Developers and Business Analysts to
understand if it is feasible to model
requirements with CHINO.
- preliminary results are positive
2.  Privacy Experts: to understand if CHINO
process visibility can improve trust
ValidationUser Study
our approach…Data sharing is essential but...

More Related Content

What's hot

IoMT as drug device cloud technology for recovery management
IoMT as drug device cloud technology for recovery managementIoMT as drug device cloud technology for recovery management
IoMT as drug device cloud technology for recovery managementGuy Vinograd ☁
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELEugene Lee
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu
 
Atris SIEM Service Datasheet NoBleed - HIPAA
Atris SIEM Service Datasheet NoBleed - HIPAAAtris SIEM Service Datasheet NoBleed - HIPAA
Atris SIEM Service Datasheet NoBleed - HIPAAKristopher Mann
 
Eryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusEryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusGuillaume Meyer
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELEugene Lee
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Centers
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And ComplianceMicrosoft
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014Alexey Vlasenko
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELEugene Lee
 
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...Tilastokeskus
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health recordssamuelerie
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Inc
 

What's hot (20)

IoMT as drug device cloud technology for recovery management
IoMT as drug device cloud technology for recovery managementIoMT as drug device cloud technology for recovery management
IoMT as drug device cloud technology for recovery management
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
Jadu GDPR guide: A easy to follow guide for Digital Service Managers and Webs...
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Atris SIEM Service Datasheet NoBleed - HIPAA
Atris SIEM Service Datasheet NoBleed - HIPAAAtris SIEM Service Datasheet NoBleed - HIPAA
Atris SIEM Service Datasheet NoBleed - HIPAA
 
Dp7
Dp7Dp7
Dp7
 
Eryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusEryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - Titus
 
Gdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework ELGdpr and ISMS Quick Map Framework EL
Gdpr and ISMS Quick Map Framework EL
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And Compliance
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 
GDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services ELGDPR for Non-European Region - Financial Services EL
GDPR for Non-European Region - Financial Services EL
 
Logs = Accountability
Logs = AccountabilityLogs = Accountability
Logs = Accountability
 
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...
Automatized validation and pseudonymization of data sets, Aura Pasila, Lea Lo...
 
Security in electronic health records
Security in electronic health recordsSecurity in electronic health records
Security in electronic health records
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
One page
One page One page
One page
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
 

Viewers also liked

1 eu.deus e o samba kipegada - prateado
1 eu.deus e o samba   kipegada - prateado1 eu.deus e o samba   kipegada - prateado
1 eu.deus e o samba kipegada - prateadoKipegada
 
Presentación1 Prueba
Presentación1 Prueba Presentación1 Prueba
Presentación1 Prueba gabryelanu
 
Asignatura Hombre Cultura y Ciencia
Asignatura Hombre Cultura y CienciaAsignatura Hombre Cultura y Ciencia
Asignatura Hombre Cultura y CienciaLiliana David
 
Innovations in search for nuclear information
Innovations in search for nuclear informationInnovations in search for nuclear information
Innovations in search for nuclear informationDobrica Savić
 
Documentary research
Documentary researchDocumentary research
Documentary researcha2colg13
 
Business History: A History of Heinz
Business History: A History of HeinzBusiness History: A History of Heinz
Business History: A History of HeinzDr Nur Suhaili Ramli
 
Media presentation Of Images
Media presentation Of ImagesMedia presentation Of Images
Media presentation Of ImagesCherokee1999
 

Viewers also liked (10)

Slideshare
SlideshareSlideshare
Slideshare
 
Indices 09 oct2013073319
Indices 09 oct2013073319Indices 09 oct2013073319
Indices 09 oct2013073319
 
1 eu.deus e o samba kipegada - prateado
1 eu.deus e o samba   kipegada - prateado1 eu.deus e o samba   kipegada - prateado
1 eu.deus e o samba kipegada - prateado
 
Presentación1 Prueba
Presentación1 Prueba Presentación1 Prueba
Presentación1 Prueba
 
Asignatura Hombre Cultura y Ciencia
Asignatura Hombre Cultura y CienciaAsignatura Hombre Cultura y Ciencia
Asignatura Hombre Cultura y Ciencia
 
Innovations in search for nuclear information
Innovations in search for nuclear informationInnovations in search for nuclear information
Innovations in search for nuclear information
 
Express of Opinion
Express of Opinion Express of Opinion
Express of Opinion
 
Documentary research
Documentary researchDocumentary research
Documentary research
 
Business History: A History of Heinz
Business History: A History of HeinzBusiness History: A History of Heinz
Business History: A History of Heinz
 
Media presentation Of Images
Media presentation Of ImagesMedia presentation Of Images
Media presentation Of Images
 

Similar to Medical Record Sharing Framework

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
From ISO to Implementation A framework for ECM Implementation
From ISO to Implementation  A framework for ECM ImplementationFrom ISO to Implementation  A framework for ECM Implementation
From ISO to Implementation A framework for ECM Implementationgbroadbent67
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
Electronic document management system Software
Electronic document management system SoftwareElectronic document management system Software
Electronic document management system SoftwareDigismartek
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Productbdirking
 
BCS DMSG Healthcare Data Management : Transformation through Migration 26-1...
BCS DMSG Healthcare Data Management : Transformation through Migration   26-1...BCS DMSG Healthcare Data Management : Transformation through Migration   26-1...
BCS DMSG Healthcare Data Management : Transformation through Migration 26-1...BCS Data Management Specialist Group
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsBharath Rao
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionBialogics
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphVaticle
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...DataWorks Summit
 

Similar to Medical Record Sharing Framework (20)

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
From ISO to Implementation A framework for ECM Implementation
From ISO to Implementation  A framework for ECM ImplementationFrom ISO to Implementation  A framework for ECM Implementation
From ISO to Implementation A framework for ECM Implementation
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Electronic document management system Software
Electronic document management system SoftwareElectronic document management system Software
Electronic document management system Software
 
Soa
SoaSoa
Soa
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
BCS DMSG Healthcare Data Management : Transformation through Migration 26-1...
BCS DMSG Healthcare Data Management : Transformation through Migration   26-1...BCS DMSG Healthcare Data Management : Transformation through Migration   26-1...
BCS DMSG Healthcare Data Management : Transformation through Migration 26-1...
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data Extraction
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
Uid security
Uid securityUid security
Uid security
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
tai lieu1
tai lieu1tai lieu1
tai lieu1
 

Medical Record Sharing Framework

  • 1. Low-Level Operations (LLO) Data Management Interfaces (DMI) Medical Record System Medical Record System Medical Record System Medical Record System Goals and Approach CHINO Process Definition and Execution Medical Record Sharing Jovan Stevovic, Fabio Casati, Bilal Farraj Dep. of Information Engineering and Computer Science University of Trento, Italy icons by http://dryicons.com EHR Electronic Health Record System The CHINO Business Process and Policy Execution Framework Healthcare services = joint work of many organizations Develop a system to easily share medical records while satisfying security, privacy and business requirements Compliance-Aware Cross-Organization Medical Record Sharing Record Store Data Filtering PEP Metadata Registry Business Rules Manager Access Rights PEP Shared Process Execution Environment The main modeler components are: A: List of all processes B: The Modeling framework C: List of the Custom CHINO elements D: Configuration of the custom elements DMI and LLO implemented using SOA and EDA architectural patterns Some of the used tools: Activiti BPM open source engine, Mule ESB, MySQL, ebXML Registry Security policies ¡ Access control ¡ Encryption strategy ¡ Data storage location Requirements and Case Study Jun Li, Hamid R. Motahari-Nezhad Hewlett-Packard Laboratories Palo Alto, California, USA Giampaolo Armellin CRG - Centro Ricerche GPI Trento, Italy 1. Identification of Business Requirements 2. Identification of Compliance Requirements 3. Definition of Compliance-Aware Data Management Scenarios 4. Definition of Executable Processes and Policies 5. Deployment and Execution inside Runtime Environment Chief Information Officer Business Analyst Business Analyst and Developer Developer Chief Compliance Officer Patient Doctor Specialist 0: specifies/accepts sharing policies1: problem description 2: consultation request 4: request records 3: consultation request 7: Records / request denied 6: retrieve record from external store 5: check policies Doctor-consultation scenario in Italy EHR Electronic Health Record System Patient Doctor Specialist 6: approve/ deny 1: problem description 2: consultation request 4: request records 3: consultation request 7: Records / request denied Doctor-consultation scenario in UK 5: request approval Privacy policies ¡ Data owners ¡ Policy enforcement points ¡ Purposes of use of data Business specific requirements ¡ EHR standards ¡ Organizations’ requirements The CHINO Methodology •  Interactions •  Business req. Descriptions of services •  Security req. •  Privacy req. Compliance requirements High-level representation describing the interactions annotated with privacy, security and compliance req. input output input output output Executable compliance-aware business processes and rules. output Compliance-aware medical record sharing output It is challenging due to security, privacy and business requirements The Process Modeling and Policy Definition Framework Enable organizations to define their own data management processes and policies that manage their data and share them with others pushRecord getRecordgrantRightspushMetadata The CHINO framework elements: ¡ Two categories of data: •  Records: detailed and privacy sensitive information •  Metadata: describes Records ¡ Rules: •  Access Right Rules: defines access control over Metadata and Records •  Privacy Filtering Rules: fine-grained data filtering mechanism for XML or HL7 data ¡ Data Management Interfaces (DMI): •  pushRecord, getRecord, grantRights to manage Records and Metadata ¡ Modeling Elements: •  BPMN 2.0 elements: supported by the Activiti engine. •  Custom CHINO BPMN elements: to facilitate access to LLO and interaction with external organizations trough DMI. ¡ Low Level Operations (LLO): •  pushRecord, getRecord, grantRights to access to internal components OpenMRS + CHINO integration 1.  Doctor-consultation module for OpenMRS 2.  Integrated with CHINO 3.  2 sets of processes to demonstrate cross- regulation record sharing. ValidationValidation SpecialistDoctor The custom CHINO tasks are mapped on Low-Level Operations over data and policies Record requests trigger record owners’ processes and policies From requirements collection to process and policy execution demo Ongoing study with 2 Groups 1.  Developers and Business Analysts to understand if it is feasible to model requirements with CHINO. - preliminary results are positive 2.  Privacy Experts: to understand if CHINO process visibility can improve trust ValidationUser Study our approach…Data sharing is essential but...