SlideShare a Scribd company logo
1 of 10
Download to read offline
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
DOI: 10.5121/hiij.2016.5101 1
A FRAMEWORK FOR EXTRACTING AND MODELING
HIPAA PRIVACY RULES FOR HEALTHCARE
APPLICATIONS
Tariq Alshugran and Julius Dichter
Department of Computer Science and Engineering, University of Bridgeport, Bridgeport,
CT, USA
ABSTRACT
Some organizations use software applications to manage their customers’ personal, medical, or financial
information. In the United States, those software applications are obligated to preserve users’ privacy and
to comply with the United States federal privacy laws and regulations. To formally guarantee compliance
with those regulations, it is essential to extract and model the privacy rules from the text of the law using a
formal framework. In this work we propose a goal-oriented framework for modeling and extracting the
privacy requirements from regulatory text using natural language processing techniques.
KEYWORDS
Privacy Policies, Data Modelling, Law Formalization, Data privacy, Role engineering
1. INTRODUCTION
Software applications are developed to help companies and organizations to process and manage
data that support their daily operations. However, this data might contain sensitive clients’
information that should be protected to ensure clients’ privacy. Besides losing clients’ trust,
neglecting to ensure the clients’ data privacy may also be unlawful and inflict serious legal and
financial consequences. Lately, different laws and regulations [1]–[3] related to data privacy have
been enacted specially in vital sectors such as health care, finance, and accounting. Those
regulations dictate how clients’ data should be disclosed and transmitted within the organization
and also with external partners. The privacy rules in laws and regulations presented a challenge
for software engineers who design and implement software applications that process
private client data. The difficulty is linked to the complexity and length of the letter of the
law and the how to guarantee that the software application is maintaining the clients’ data
privacy in compliance with the law.
Some healthcare organizations are trying to perform their own interpretation of the law privacy
rules by creating custom systems. However, the problems with such approach is that the margin
of error while interpreting the letter of the law is high specially with separate efforts carried out
by individual companies. According to a survey carried out to check the Healthcare Insurance
Portability and Accountability Act (HIPAA) requirements interpretation created for medical and
healthcare related applications, none of the frameworks were well developed to capture the
relationships specified in the law [4]. To solve this problem, a standard framework is required that
will analyze the regulatory text and provide a method to extract the relevant component that can
be used during software roles engineering and development. The extracted components will
include all the possible arrangements of roles, purposes, permissions, temporal factors, and any
carried out obligations.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
2
In this work we propose a framework to analyzes, extracts, and models the privacy requirements
from HIPAA regulatory text. The framework goal is to translate the law privacy rules text into
more manageable components in the form of entities, roles, purposes, and obligations. Those
components together can be used as building blocks to create formal privacy policies. The process
concentrate on two main components; entities and their roles, and data access context. To get the
first part, the framework will parse the privacy sections of the regulatory text to mine all the
subjects, and then categorize those subjects into roles based on their characterization in the law.
To acquire the access context, the process will extract all the purposes, temporal clauses and any
carried out obligations and classify them based on their permissibility.
The rest of this work is organized as follows. Section 2 examines the complexity of HIPAA and
other regulatory text modeling. In section 3, we cover access control models and the elements that
should be extracted based on the selected access control mode. Whereas section 4 describes the
proposed framework for extracting and modeling the access requires context from the regulatory
text. Section 5 provides a literature survey of laws and regulations modeling and current proposed
approaches. Finally, we discuss our future work and conclude in section 6.
2. LAWS’ PRIVACY RULES AND MODELING COMPLEXITY
In the U.S., numerous federal laws and regulations were legislated to guarantee individuals’ right
to be able to access and port their private information stored and managed by service providers
while protecting that information from unauthorized access. For example, the Gramm-Leach-
Bliley Act (GLBA) of 1999 [2] is designed to protect individuals’ financial information from
being breached without proper authorization. The Health Insurance Portability and Accountability
Act (HIPAA) of 1996 [1] is another example, section 164 of HIPAA is intended explicitly to
protect patients’ healthcare information and medical records from unauthorized disclosure [5].
According to HIPAA, any healthcare related information that can identify an individual and can
be stored or transmitted via any media format is defined as Protected Health Information (PHI).
HIPAA privacy rules control the storage, transmission, and disclosure of all Protected Health
Information. Usually the PHI is collected and maintained by healthcare insurance plan, healthcare
provider, healthcare clearinghouse or any other similar organization identified by HIPAA as
Covered Entity. Comparable privacy rules can also be found in other federal regulations as well.
2.1. Modeling Complexity
The U.S. federal regulations documents are written in a complex format and technical language
known as legalese. Legalese or legal English uses different vocabulary and syntax than that used
in ordinary English. The complex format and legal terminologies makes legal documents hard to
read and interpret.
A part from the document language, the structured format makes the text prone to
misinterpretations and other ambiguities like cross references and exceptions. The document is
usually structured into parts (e.g. Part 164 of HIPAA). Each part is then divided into subparts,
which is additionally divided into sections (e.g. Section §164.528). Some sections are also
divided into subparagraphs with multiple points in the same sentence. This create some
inconsistency as some privacy rules are spanning multiple points, subparagraphs, paragraphs,
or event sections. For example, the subparagraph §164.528(a)(2)(ii) contains three points (A),
(B), and (C) in the same sentence: “the covered entity must:(A)...;(B)...; and (C)...”, where each
one of these points defines a different obligation that should be carried out by the covered entity.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
3
Exceptions and Cross-references to other sections add more complexity to the modeling process
as they require an additional processing effort. References usually entail priority between
paragraphs and add more clarity to the privacy requirements. However, sometimes references
might introduce ambiguities due to the possibility of nested and multilevel referencing in the form
of cross-references. Cross-references occur when a section or a paragraph in the law is
referencing another section/paragraph that has a reference to another rule. For example, the
subparagraph §164.528 (a)(2)(i) describes individuals’ suspension of rights obligation. This right
is also addressed in a different paragraph as highlighted by the phrase “as provided in
§164.512(d)” at the end of the paragraph establishing a reference. Nevertheless, in the subsequent
paragraph §164.528(a)(2)(ii), the phrase “pursuant to paragraph (i)” is a reference to the
preceding paragraph. Hence, to model the right indicated in §164.528(a)(2)(ii), we need to refer
to §164.512(d) creating an indirect relation between the two paragraphs. On the other hand,
exceptions are rules that contradict or negate other rules by changing the permissibility right or by
adding more conditions or obligation. So, if the first rule grants a right to access a PHI, the
exception would either add more conditions to clarify that right or grant permission and vice
versa. For instance, §164.512(c)(1) in HIPAA grants the right to disclose a PHI if the information
is about adult victims of abuse, neglect or domestic violence, however, §164.512(c)(1)(ii)
presents an exception to this right by adding victims agreement as a condition for such a
disclosure.
3. ACCESS CONTEXT
Access context represents the elements that can be used as an input to the to an access control
system. To create a privacy preserving access control system that enforces the privacy rules from
the regulatory text, we need to extract the access context. In this section we show those
components and the importance of formalizing them.
3.1. Context-Based Access Control
In information security, Access Control is implemented as a mean to decide whether any specific
authenticated system user has the proper permission to access a certain data object, or carry out a
particular type of operation (e.g. read, write, delete …etc.) on that object [6].
Most access control models are described using three terms: subject, object, and operation.
Subject refers to any authenticated user, it could be a system, a person, or a process. Whereas
object is defined as the private data that the access control system is protecting. Finally, operation
is any action that can be taken by the subject on the object. Figure 1 shows the three terms of
simple access control model. The permissibility to carry out those operations is ruled by a
collection of access rights expressed in the format:
ALLOW [Subject]
TO PERFORM [Operation] ON [Object]
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
4
Figure 1. Simple Access Control Model
Access control models evolved over time to solve particular issues the traditional model was not
able to handle correctly. For instance, Role-Based Access Control model (RBAC) [7] extended
the traditional simple access control model described above to add the subject role. In RBAC
users’ role is used in the access right rules instead of users’ identities. RBAC model was
introduced to solve the any inconsistency faced by dynamic systems where users’ role is prone to
change, and hence, there permission and access rights should change as well to adapt the new
roles. Figure 2 below illustrate RBAC components and the relation with the system users. RBAC
access rights rules are formally formatted and expressed as:
ALLOW [Role]
TO PERFORM [Operation] ON [Object]
Figure 2. Role-Based Access Control (RBAC) Model
In order to facilitate a more fine-grained detail that will capture the privacy rules and
requirements of HIPAA regulatory text, a new model was introduced to capture the access
context. The Context-Based Access Control (CBAC) model is an extension to RBAC with more
details to allow higher flexibility and regulatory compliance. CBAC depends on the user roles,
request purpose, and object type to determine the permissibility of the access request. CBAC also
provides a mechanism to log any carried out obligations as a result of granting access to the
object. Recently, many formats were suggested to represent CBAC, in this work we propose a
modified version Powers et al [6] version of the Privacy Access Control model as shown in figure
3. CBAC access rules can be formally expressed in the format below:
ALLOW [Active Role]
TO PERFORM [Operation]
ON [Data Type]
RELATED TO [Data Owner Type]
FOR [Purpose]
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
5
PROVIDED [Condition]
CARRY OUT [Obligation]
Figure 3. Context-Based Access Control (CBAC) Model
3.2. CBAC Components
To better understand what elements and components the framework should extract from
regulatory text, we need to align the extraction and modeling process with CBAC access rules. In
this section we will describe each component and how to formally model that component in order
to extract it.
Requester Active Role: As CBAC is an extension of RBAC, it also uses the requester role
instead of the requester identity. However, due to the fact that any user can be in multiple roles,
we use the current active role only. For example, if Alice is a doctor and a patient at the same
time, when accessing her own medical file she will be treated as a patient only as that is the
current active role of Alice.
Operation: any set of actions that can be applied to data objects, similar to the traditional
model. The set contains read, write, and delete action in addition to any other applicable
operation provided by the system.
Data Type: Context-Based access rules are not tied directly to a particular data object, but
rather to the type of data object. The data type can be defined at high-level (e.g. treatment
related files), or at a much lower-level (e.g. Medical chart files, CT scan images …etc.).
This introduces the notion of attaching attributes or metadata to the data itself.
Data Owner Type: The data owner type element specifies the state and the type of the
owner of the data object. By capturing this element, we can establish a relation between
the PHI, its owner, and the requester. For example, if Alice is a doctor requesting access
to Bob’s medical file, we can check if Alice is role as a doctor is relevant to Bob’s file as
a patient of Alice. If the relation is established then in this case Bob is the owner of the
PHI and his type in relation to Alice is a patient.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
6
Purpose: This element represents the reason why the access requester is requesting
access to the specified data object type. Purposes can also be classified at a high-level or
low-level depending on the provided request context and the letter of the law. It could be
healthcare related like treatment or medical consulting, financial for the purpose of
accounting, or legal like violence and crime investigations.
Conditions: Any pre-defined additional conditions and criteria required to be fulfilled
before accessing the protected data object or allowing the disclosure. A common example
of conditions in HIPAA is obtaining the data owner permission and consent before
sharing their data with any third party.
Obligations: Obligations in access request refer to the action that should be carried out by
the covered entity, the access requester, or the system itself after permission was granted
and the data was transmitted. It might include operations like logging for audit purposes
or notifying the data owner of the disclosure action.
4. THE MODELING PROCESS
This section presents the proposed framework process and steps used to extract privacy
requirements from the regulatory text. The process is divided into two activities: firstly is the
model and analysis activity to model the regulatory text, and secondly the identification and
extraction activity to extract the privacy requirements context. Each one of the two activities
contains a number of steps. Figure 4 demonstrates the extraction process with the two activities as
well as each activity initial inputs and the expected outputs.
4.1. Model and Analyze HIPAA
The purpose of this activity is to overcome the difficulties and issues that complicate HIPAA
modeling as explained in section II.B. Raw HIPAA rules are used as an input to the activity, and
then the following steps are performed:
Step 1: Identify scopes and definitions: the first step is to outline the extraction scope. In this
framework, the emphasis will be on the privacy rules related to preserving patients’ identity and
PHI disclosure. After analyzing HIPAA regulatory text and excluding all the abstract, non-
technical requirements, we found that the extraction process should only be applied to the privacy
requirements from the following subsections of HIPAA: §164.502, §164.506, §164.510,
§164.512, §164.514, and §164.524.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
7
Figure 4. HIPAA privacy requirements extraction process
Step 2: Identify and resolve rules dependencies, cross-references, and exceptions: the goal of this
step is to validate the subset of selected rules from step 1 and to add more clarity to HIPAA legal
text. This goal is attained by replacing self-references, dependencies, and cross-references, with
the exact description from the referenced rule, or by applying a similar depiction to improve the
rule readability and interpretation. Alternatively, if the reference is identified as a condition it
might be replaced with a rule identifier placeholder for further processing in an advanced stage of
the process.
The output of the first activity is a reference-free less-ambiguous subset of HIPAA rules that is
focused only on patients’ privacy. This output will then be used as an input in the following
activity.
4.2. Identify and Extract the Context Elements
The second activity aims to perform the extraction process. Similar to the preceding activity, this
activity also is divided into multiple steps where the final step is the responsible for the context
elements extraction. In this activity the regulatory text is parsed using a Natural Language
Processing (NLP) application to highlight phrases that may establish a possible context element.
Figure 5 outlines the components of the rule §164.528 (a)(2)(i) of HIPAA as an example of the
expected results.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
8
Figure 5. An outline of HIPAA rule §164.528 (a)(2)(i) components.
Step 1: Clearing ambiguities: HIPAA legal text contains domain-specific wording and
terminologies that will require the assistance of law professional to provide a precise
interpretation and definition of the text. As some words, terms, and phrases might carry multiple
meanings causing further ambiguity and a higher chance of misinterpretation. At this step, all the
ambiguous terms, words, and phrases will be mapped to a set of possible meanings as proposed
by the work of Otto et al [8].
Step 2: Text parsing and elements extraction: a text parser is used to identify any possible context
element. Rules of generalization and specialization are also applied to specify generic roles.
Table 1. Subparagraph §164.528 (a)(2)(i) Elements Classification
Element Element Classification
R164_528_a_2_i Rule Id
covered entity Role
must Operator
temporarily Temporal factor
suspend rights to receive an accounting
of disclosure
Action
health oversight agency Role
law enforcement official Role
(R164_512_d) OR (R164_512_d) Condition
Step 3: Elements Classification: Numerous approaches were proposed to classify elements [8]–
[12]. Nevertheless, each approach was proposed to solve a particular problem or introduced a
special notation that might not be applicable for generic access control. For instance, Hohfeld
classification presented the notion of rights and responsibilities. Hohfeld theory represents the
relationships between actors and the law based on their responsibilities and rights within the legal
text context [13]. However, our framework is more concentrated on the concept of Context-Based
Access Control (CBAC) where the core focus is to identify roles, data type, purposes, conditions,
temporal factors, and obligations. Hence, a Goal-Driven approach can be applied where the goal
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
9
is to extract the CBAC components. Table 1 shows an example of elements classification
constructed using a goal-driven approach on the data from §164.528 (a)(2)(i) of HIPAA.
5. RELATED WORK
Recent researches in the area of role extraction and engineering reveals a variety of proposed
methods for extracting and modeling regulation components for different purposes. One of the
oldest recognized efforts to classify the contents of regulatory text is attributed to Wesley Hohfeld
which is known as Hohfeld legal taxonomy published in 1917 in Yale Law Journal [13]. Hohfeld
taxonomy classifies regulatory text based on the notion of rights and obligations. Few recent
researches have built their extraction models based on Hohfeld legal taxonomy like the work of
Siena et al [14] and Islam et al [12]. Other approaches used Natural Language Processing (NLP)
techniques to spot linguistic patterns to model the law and extract the context from the legal text
[15]. In addition to the language patterns and Hohfeld taxonomy, other researchers used different
methods including: analytical modeling based on organizational structure as in the work of
Crook[9], UML-based [16], [11] method for the extraction of privacy requirements from
organizations privacy requirements, and scenario-driven methods established for predefined set of
tasks and scenarios [10]. Jorshari et al. work [17] focused on eliciting the security requirements in
general without making the approach close enough to be adapted for extracting privacy
requirements. Darimont et al [17] proposed a Goal-Oriented Requirements Engineering (GORE)
approach to classify rules and form goals where those goals are then refined in an incremental
fashion until all related tasks, actors, and uses-cases are discovered and extracted.
6. CONCLUSIONS
In this work, we proposed a framework to model the privacy requirements from regulatory text
and to extract the possible context elements in the form roles, purposes, and obligations. The
framework is designed to overcome the traditional complexities and challenges that face laws and
regulations modeling. The framework consists of multiple steps starting by closely inspecting and
analyzing the regulatory text to identify the parts of interest of the law that is related to the
privacy requirements. Then it clarifies ambiguities from the letter of the law by resolving cross-
references, dependencies, and handling rules exceptions. Next, a Goal-Driven approach is applied
to examine the identified targeted rules text to extract all keywords that may define a context
element.
In a later phase of this research, the context elements extracted using this framework will be used
to create privacy policies as well as in the decision engine in an access control model. In order to
implement such a model, the next phase will also include identifying the decision engine logic
and the specification language that will be used for privacy policy representation.
REFERENCES
[1] Health Insurance Portability and Accountability Act of 1996. Public Law 104-191., vol. 110. 1996,
pp. 1936–2103.
[2] Gramm-Leach-Bliley Act of 1999. Public Law 106-102. Senate Banking Committee, 1999.
[3] Sarbanes-Oxley Act of 2002. Public Law 107-204. 2002.
[4] a. I. Anton, J. B. Earp, C. Potts, and T. a. Alspaugh, “The role of policy and stakeholder privacy
values in requirementsnengineering,” Proc. Fifth IEEE Int. Symp. Requir. Eng., no. August, pp. 1–
12, 2001.
[5] S. J. Dwyer III, A. C. Weaver, and K. K. Hughes, “Health Insurance Portability and Accountability
Act,” Secur. Issues Digit. Med. Enterp., vol. 72, no. 2, pp. 9–18, 2004.
Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016
10
[6] C. S. Powers, P. Ashley, and M. Schunter, “Privacy promises, access control, and privacy
management. Enforcing privacy throughout an enterprise by extending access control,” Proceedings.
Third Int. Symp. Electron. Commer., pp. 13–21, 2002.
[7] J. Williams, “Role-based access control models for E-healthcare systems,” Florida A&M Univ. Dep.
Comput. Inf. Sci., 2007.
[8] P. N. Otto and A. I. Anton, “Addressing Legal Requirements in Requirements Engineering,” in
Requirements Engineering Conference, 2007. RE ’07. 15th IEEE International, 2007, pp. 5, 14, 15.
[9] R. Crook, W. Hall, and M. Keynes, “Towards an Analytical Role Modelling Framework for Security
Requirements,” in Proc. of the 8 th International Workshop on Requirements Engineering: Foundation
for Software Quality (REFSQ’02), 2002, pp. 1–14.
[10] G. Neumann and M. Strembeck, “A Scenario-driven Role Engineering Process for Functional RBAC
Roles,” in Proc. of the 7 th ACM Symposium on Access Control Models and Technologies
(SACMAT’02), 2002, pp. 33–42.
[11] P. Epstein and R. Sandhu, “Towards A UML Based Approach to Role Engineering,” in Proc. of the 4
th ACM Workshop on Role-Based Access Control (RBAC’99), 1999, pp. 135–143.
[12] F. Jorshari, H. Mouratidis, and S. Islam, “Extracting security requirements from relevant laws and
regulations,” in Sixth International Conference on Research Challenges in Information Science
(RCIS), 2012, pp. 1–9.
[13] W. N. Hohfeld, “Fundamental Legal Conceptions as Applied in Judicial Reasoning,” Yale Law J.,
vol. 26, no. 8, pp. 710–770, Jun. 1917.
[14] A. Siena, J. Mylopoulos, A. Perini, and A. Susi, “From Laws to Requirements,” in Requirements
Engineering and Law, 2008. RELAW ’08, 2008, pp. 6–10.
[15] T. D. Breaux and A. I. Anto´n, “Analyzing Regulatory Rules for Privacy and Security Requirements,”
IEEE Trans. Softw. Eng., vol. 34, no. 1, pp. 5–20, 2008.
[16] S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider, “Eliciting Security Requirements and
Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec,” Requir. Eng.
J., vol. 15, no. 1, pp. 63–93, 2010.
[17] R. Darimont, M. Lemoine, and B. Cediti, “Goal-oriented Analysis of Regulations,” in REMO2V06:
Int. Workshop on Regulations Modelling and their Verification & Validation, 2006, pp. 838–844.

More Related Content

What's hot

Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceSejahtera Affif
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Brian Dickerson
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesWhoisXML API
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriestbaqerz
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII- Mark - Fullbright
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 

What's hot (11)

Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Data Breach Response Checklist
Data Breach Response ChecklistData Breach Response Checklist
Data Breach Response Checklist
 
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriest
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
 
Apple Report Privacy of its Users
Apple Report Privacy of its UsersApple Report Privacy of its Users
Apple Report Privacy of its Users
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 

Similar to A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE APPLICATIONS

Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfmohammedfootwear
 
What is HIPAA Compliance?
What is HIPAA Compliance?What is HIPAA Compliance?
What is HIPAA Compliance?Power Admin LLC
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docxajoy21
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...Quinnipiac University
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxcravennichole326
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...David Sweigert
 
Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...David Sweigert
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5ProductNation/iSPIRT
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Envision Technology Advisors
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Elspeth Gygax
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docxnolanalgernon
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 

Similar to A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE APPLICATIONS (20)

Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
What is HIPAA Compliance?
What is HIPAA Compliance?What is HIPAA Compliance?
What is HIPAA Compliance?
 
What explains why certain services were covered and others were not .docx
 What explains why certain services were covered and others were not .docx What explains why certain services were covered and others were not .docx
What explains why certain services were covered and others were not .docx
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
DKapellmann_Security Compliance Models
DKapellmann_Security Compliance ModelsDKapellmann_Security Compliance Models
DKapellmann_Security Compliance Models
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docxChapter 10 Privacy and Security of Health RecordsLearnin.docx
Chapter 10 Privacy and Security of Health RecordsLearnin.docx
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
 
Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...Are NIST standards clouding the implementation of HIPAA security risk assessm...
Are NIST standards clouding the implementation of HIPAA security risk assessm...
 
Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5Health Information Flows Technical Standards - V 0.5
Health Information Flows Technical Standards - V 0.5
 
Scary acronyms
Scary acronymsScary acronyms
Scary acronyms
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docx
 
Privacy preserving
Privacy preservingPrivacy preserving
Privacy preserving
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 

More from hiij

Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTSAUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTShiij
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...hiij
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMShiij
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)hiij
 
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...hiij
 
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATASUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATAhiij
 
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWAN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWhiij
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...hiij
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...hiij
 
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?hiij
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...hiij
 
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...hiij
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...hiij
 
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...hiij
 

More from hiij (20)

Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTSAUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
AUTOMATIC AND NON-INVASIVE CONTINUOUS GLUCOSE MONITORING IN PAEDIATRIC PATIENTS
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
 
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
BRIEF COMMENTARY: USING A LOGIC MODEL TO INTEGRATE PUBLIC HEALTH INFORMATICS ...
 
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMSINTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
INTEGRATING MACHINE LEARNING IN CLINICAL DECISION SUPPORT SYSTEMS
 
Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)Health Informatics - An International Journal (HIIJ)
Health Informatics - An International Journal (HIIJ)
 
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...The Proposed Guidelines for Cloud Computing Migration for South African Rural...
The Proposed Guidelines for Cloud Computing Migration for South African Rural...
 
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATASUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
SUPPORTING LARGE-SCALE NUTRITION ANALYSIS BASED ON DIETARY SURVEY DATA
 
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEWAN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
AN EHEALTH ADOPTION FRAMEWORK FOR DEVELOPING COUNTRIES: A SYSTEMATIC REVIEW
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
 
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
CHINESE PHARMACISTS LAW MODIFICATION, HOW TO PROTECT PATIENTS‘INTERESTS?
 
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
GENDER DISPARITYOF TUBERCULOSISBURDENIN LOW-AND MIDDLE-INCOME COUNTRIES: A SY...
 
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
PERSONALIZED MEDICINE SUPPORT SYSTEM: RESOLVING CONFLICT IN ALLOCATION TO RIS...
 
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
BRIEF COMMUNICATIONS DATA HYGIENE: IMPORTANT STEP IN DECISIONMAKING WITH IMPL...
 
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
CLINICAL AND SOCIAL DETERMINANTS TO IMPROVE DOD/VETERAN WELL BEING: THE SERVI...
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE APPLICATIONS

  • 1. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 DOI: 10.5121/hiij.2016.5101 1 A FRAMEWORK FOR EXTRACTING AND MODELING HIPAA PRIVACY RULES FOR HEALTHCARE APPLICATIONS Tariq Alshugran and Julius Dichter Department of Computer Science and Engineering, University of Bridgeport, Bridgeport, CT, USA ABSTRACT Some organizations use software applications to manage their customers’ personal, medical, or financial information. In the United States, those software applications are obligated to preserve users’ privacy and to comply with the United States federal privacy laws and regulations. To formally guarantee compliance with those regulations, it is essential to extract and model the privacy rules from the text of the law using a formal framework. In this work we propose a goal-oriented framework for modeling and extracting the privacy requirements from regulatory text using natural language processing techniques. KEYWORDS Privacy Policies, Data Modelling, Law Formalization, Data privacy, Role engineering 1. INTRODUCTION Software applications are developed to help companies and organizations to process and manage data that support their daily operations. However, this data might contain sensitive clients’ information that should be protected to ensure clients’ privacy. Besides losing clients’ trust, neglecting to ensure the clients’ data privacy may also be unlawful and inflict serious legal and financial consequences. Lately, different laws and regulations [1]–[3] related to data privacy have been enacted specially in vital sectors such as health care, finance, and accounting. Those regulations dictate how clients’ data should be disclosed and transmitted within the organization and also with external partners. The privacy rules in laws and regulations presented a challenge for software engineers who design and implement software applications that process private client data. The difficulty is linked to the complexity and length of the letter of the law and the how to guarantee that the software application is maintaining the clients’ data privacy in compliance with the law. Some healthcare organizations are trying to perform their own interpretation of the law privacy rules by creating custom systems. However, the problems with such approach is that the margin of error while interpreting the letter of the law is high specially with separate efforts carried out by individual companies. According to a survey carried out to check the Healthcare Insurance Portability and Accountability Act (HIPAA) requirements interpretation created for medical and healthcare related applications, none of the frameworks were well developed to capture the relationships specified in the law [4]. To solve this problem, a standard framework is required that will analyze the regulatory text and provide a method to extract the relevant component that can be used during software roles engineering and development. The extracted components will include all the possible arrangements of roles, purposes, permissions, temporal factors, and any carried out obligations.
  • 2. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 2 In this work we propose a framework to analyzes, extracts, and models the privacy requirements from HIPAA regulatory text. The framework goal is to translate the law privacy rules text into more manageable components in the form of entities, roles, purposes, and obligations. Those components together can be used as building blocks to create formal privacy policies. The process concentrate on two main components; entities and their roles, and data access context. To get the first part, the framework will parse the privacy sections of the regulatory text to mine all the subjects, and then categorize those subjects into roles based on their characterization in the law. To acquire the access context, the process will extract all the purposes, temporal clauses and any carried out obligations and classify them based on their permissibility. The rest of this work is organized as follows. Section 2 examines the complexity of HIPAA and other regulatory text modeling. In section 3, we cover access control models and the elements that should be extracted based on the selected access control mode. Whereas section 4 describes the proposed framework for extracting and modeling the access requires context from the regulatory text. Section 5 provides a literature survey of laws and regulations modeling and current proposed approaches. Finally, we discuss our future work and conclude in section 6. 2. LAWS’ PRIVACY RULES AND MODELING COMPLEXITY In the U.S., numerous federal laws and regulations were legislated to guarantee individuals’ right to be able to access and port their private information stored and managed by service providers while protecting that information from unauthorized access. For example, the Gramm-Leach- Bliley Act (GLBA) of 1999 [2] is designed to protect individuals’ financial information from being breached without proper authorization. The Health Insurance Portability and Accountability Act (HIPAA) of 1996 [1] is another example, section 164 of HIPAA is intended explicitly to protect patients’ healthcare information and medical records from unauthorized disclosure [5]. According to HIPAA, any healthcare related information that can identify an individual and can be stored or transmitted via any media format is defined as Protected Health Information (PHI). HIPAA privacy rules control the storage, transmission, and disclosure of all Protected Health Information. Usually the PHI is collected and maintained by healthcare insurance plan, healthcare provider, healthcare clearinghouse or any other similar organization identified by HIPAA as Covered Entity. Comparable privacy rules can also be found in other federal regulations as well. 2.1. Modeling Complexity The U.S. federal regulations documents are written in a complex format and technical language known as legalese. Legalese or legal English uses different vocabulary and syntax than that used in ordinary English. The complex format and legal terminologies makes legal documents hard to read and interpret. A part from the document language, the structured format makes the text prone to misinterpretations and other ambiguities like cross references and exceptions. The document is usually structured into parts (e.g. Part 164 of HIPAA). Each part is then divided into subparts, which is additionally divided into sections (e.g. Section §164.528). Some sections are also divided into subparagraphs with multiple points in the same sentence. This create some inconsistency as some privacy rules are spanning multiple points, subparagraphs, paragraphs, or event sections. For example, the subparagraph §164.528(a)(2)(ii) contains three points (A), (B), and (C) in the same sentence: “the covered entity must:(A)...;(B)...; and (C)...”, where each one of these points defines a different obligation that should be carried out by the covered entity.
  • 3. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 3 Exceptions and Cross-references to other sections add more complexity to the modeling process as they require an additional processing effort. References usually entail priority between paragraphs and add more clarity to the privacy requirements. However, sometimes references might introduce ambiguities due to the possibility of nested and multilevel referencing in the form of cross-references. Cross-references occur when a section or a paragraph in the law is referencing another section/paragraph that has a reference to another rule. For example, the subparagraph §164.528 (a)(2)(i) describes individuals’ suspension of rights obligation. This right is also addressed in a different paragraph as highlighted by the phrase “as provided in §164.512(d)” at the end of the paragraph establishing a reference. Nevertheless, in the subsequent paragraph §164.528(a)(2)(ii), the phrase “pursuant to paragraph (i)” is a reference to the preceding paragraph. Hence, to model the right indicated in §164.528(a)(2)(ii), we need to refer to §164.512(d) creating an indirect relation between the two paragraphs. On the other hand, exceptions are rules that contradict or negate other rules by changing the permissibility right or by adding more conditions or obligation. So, if the first rule grants a right to access a PHI, the exception would either add more conditions to clarify that right or grant permission and vice versa. For instance, §164.512(c)(1) in HIPAA grants the right to disclose a PHI if the information is about adult victims of abuse, neglect or domestic violence, however, §164.512(c)(1)(ii) presents an exception to this right by adding victims agreement as a condition for such a disclosure. 3. ACCESS CONTEXT Access context represents the elements that can be used as an input to the to an access control system. To create a privacy preserving access control system that enforces the privacy rules from the regulatory text, we need to extract the access context. In this section we show those components and the importance of formalizing them. 3.1. Context-Based Access Control In information security, Access Control is implemented as a mean to decide whether any specific authenticated system user has the proper permission to access a certain data object, or carry out a particular type of operation (e.g. read, write, delete …etc.) on that object [6]. Most access control models are described using three terms: subject, object, and operation. Subject refers to any authenticated user, it could be a system, a person, or a process. Whereas object is defined as the private data that the access control system is protecting. Finally, operation is any action that can be taken by the subject on the object. Figure 1 shows the three terms of simple access control model. The permissibility to carry out those operations is ruled by a collection of access rights expressed in the format: ALLOW [Subject] TO PERFORM [Operation] ON [Object]
  • 4. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 4 Figure 1. Simple Access Control Model Access control models evolved over time to solve particular issues the traditional model was not able to handle correctly. For instance, Role-Based Access Control model (RBAC) [7] extended the traditional simple access control model described above to add the subject role. In RBAC users’ role is used in the access right rules instead of users’ identities. RBAC model was introduced to solve the any inconsistency faced by dynamic systems where users’ role is prone to change, and hence, there permission and access rights should change as well to adapt the new roles. Figure 2 below illustrate RBAC components and the relation with the system users. RBAC access rights rules are formally formatted and expressed as: ALLOW [Role] TO PERFORM [Operation] ON [Object] Figure 2. Role-Based Access Control (RBAC) Model In order to facilitate a more fine-grained detail that will capture the privacy rules and requirements of HIPAA regulatory text, a new model was introduced to capture the access context. The Context-Based Access Control (CBAC) model is an extension to RBAC with more details to allow higher flexibility and regulatory compliance. CBAC depends on the user roles, request purpose, and object type to determine the permissibility of the access request. CBAC also provides a mechanism to log any carried out obligations as a result of granting access to the object. Recently, many formats were suggested to represent CBAC, in this work we propose a modified version Powers et al [6] version of the Privacy Access Control model as shown in figure 3. CBAC access rules can be formally expressed in the format below: ALLOW [Active Role] TO PERFORM [Operation] ON [Data Type] RELATED TO [Data Owner Type] FOR [Purpose]
  • 5. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 5 PROVIDED [Condition] CARRY OUT [Obligation] Figure 3. Context-Based Access Control (CBAC) Model 3.2. CBAC Components To better understand what elements and components the framework should extract from regulatory text, we need to align the extraction and modeling process with CBAC access rules. In this section we will describe each component and how to formally model that component in order to extract it. Requester Active Role: As CBAC is an extension of RBAC, it also uses the requester role instead of the requester identity. However, due to the fact that any user can be in multiple roles, we use the current active role only. For example, if Alice is a doctor and a patient at the same time, when accessing her own medical file she will be treated as a patient only as that is the current active role of Alice. Operation: any set of actions that can be applied to data objects, similar to the traditional model. The set contains read, write, and delete action in addition to any other applicable operation provided by the system. Data Type: Context-Based access rules are not tied directly to a particular data object, but rather to the type of data object. The data type can be defined at high-level (e.g. treatment related files), or at a much lower-level (e.g. Medical chart files, CT scan images …etc.). This introduces the notion of attaching attributes or metadata to the data itself. Data Owner Type: The data owner type element specifies the state and the type of the owner of the data object. By capturing this element, we can establish a relation between the PHI, its owner, and the requester. For example, if Alice is a doctor requesting access to Bob’s medical file, we can check if Alice is role as a doctor is relevant to Bob’s file as a patient of Alice. If the relation is established then in this case Bob is the owner of the PHI and his type in relation to Alice is a patient.
  • 6. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 6 Purpose: This element represents the reason why the access requester is requesting access to the specified data object type. Purposes can also be classified at a high-level or low-level depending on the provided request context and the letter of the law. It could be healthcare related like treatment or medical consulting, financial for the purpose of accounting, or legal like violence and crime investigations. Conditions: Any pre-defined additional conditions and criteria required to be fulfilled before accessing the protected data object or allowing the disclosure. A common example of conditions in HIPAA is obtaining the data owner permission and consent before sharing their data with any third party. Obligations: Obligations in access request refer to the action that should be carried out by the covered entity, the access requester, or the system itself after permission was granted and the data was transmitted. It might include operations like logging for audit purposes or notifying the data owner of the disclosure action. 4. THE MODELING PROCESS This section presents the proposed framework process and steps used to extract privacy requirements from the regulatory text. The process is divided into two activities: firstly is the model and analysis activity to model the regulatory text, and secondly the identification and extraction activity to extract the privacy requirements context. Each one of the two activities contains a number of steps. Figure 4 demonstrates the extraction process with the two activities as well as each activity initial inputs and the expected outputs. 4.1. Model and Analyze HIPAA The purpose of this activity is to overcome the difficulties and issues that complicate HIPAA modeling as explained in section II.B. Raw HIPAA rules are used as an input to the activity, and then the following steps are performed: Step 1: Identify scopes and definitions: the first step is to outline the extraction scope. In this framework, the emphasis will be on the privacy rules related to preserving patients’ identity and PHI disclosure. After analyzing HIPAA regulatory text and excluding all the abstract, non- technical requirements, we found that the extraction process should only be applied to the privacy requirements from the following subsections of HIPAA: §164.502, §164.506, §164.510, §164.512, §164.514, and §164.524.
  • 7. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 7 Figure 4. HIPAA privacy requirements extraction process Step 2: Identify and resolve rules dependencies, cross-references, and exceptions: the goal of this step is to validate the subset of selected rules from step 1 and to add more clarity to HIPAA legal text. This goal is attained by replacing self-references, dependencies, and cross-references, with the exact description from the referenced rule, or by applying a similar depiction to improve the rule readability and interpretation. Alternatively, if the reference is identified as a condition it might be replaced with a rule identifier placeholder for further processing in an advanced stage of the process. The output of the first activity is a reference-free less-ambiguous subset of HIPAA rules that is focused only on patients’ privacy. This output will then be used as an input in the following activity. 4.2. Identify and Extract the Context Elements The second activity aims to perform the extraction process. Similar to the preceding activity, this activity also is divided into multiple steps where the final step is the responsible for the context elements extraction. In this activity the regulatory text is parsed using a Natural Language Processing (NLP) application to highlight phrases that may establish a possible context element. Figure 5 outlines the components of the rule §164.528 (a)(2)(i) of HIPAA as an example of the expected results.
  • 8. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 8 Figure 5. An outline of HIPAA rule §164.528 (a)(2)(i) components. Step 1: Clearing ambiguities: HIPAA legal text contains domain-specific wording and terminologies that will require the assistance of law professional to provide a precise interpretation and definition of the text. As some words, terms, and phrases might carry multiple meanings causing further ambiguity and a higher chance of misinterpretation. At this step, all the ambiguous terms, words, and phrases will be mapped to a set of possible meanings as proposed by the work of Otto et al [8]. Step 2: Text parsing and elements extraction: a text parser is used to identify any possible context element. Rules of generalization and specialization are also applied to specify generic roles. Table 1. Subparagraph §164.528 (a)(2)(i) Elements Classification Element Element Classification R164_528_a_2_i Rule Id covered entity Role must Operator temporarily Temporal factor suspend rights to receive an accounting of disclosure Action health oversight agency Role law enforcement official Role (R164_512_d) OR (R164_512_d) Condition Step 3: Elements Classification: Numerous approaches were proposed to classify elements [8]– [12]. Nevertheless, each approach was proposed to solve a particular problem or introduced a special notation that might not be applicable for generic access control. For instance, Hohfeld classification presented the notion of rights and responsibilities. Hohfeld theory represents the relationships between actors and the law based on their responsibilities and rights within the legal text context [13]. However, our framework is more concentrated on the concept of Context-Based Access Control (CBAC) where the core focus is to identify roles, data type, purposes, conditions, temporal factors, and obligations. Hence, a Goal-Driven approach can be applied where the goal
  • 9. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 9 is to extract the CBAC components. Table 1 shows an example of elements classification constructed using a goal-driven approach on the data from §164.528 (a)(2)(i) of HIPAA. 5. RELATED WORK Recent researches in the area of role extraction and engineering reveals a variety of proposed methods for extracting and modeling regulation components for different purposes. One of the oldest recognized efforts to classify the contents of regulatory text is attributed to Wesley Hohfeld which is known as Hohfeld legal taxonomy published in 1917 in Yale Law Journal [13]. Hohfeld taxonomy classifies regulatory text based on the notion of rights and obligations. Few recent researches have built their extraction models based on Hohfeld legal taxonomy like the work of Siena et al [14] and Islam et al [12]. Other approaches used Natural Language Processing (NLP) techniques to spot linguistic patterns to model the law and extract the context from the legal text [15]. In addition to the language patterns and Hohfeld taxonomy, other researchers used different methods including: analytical modeling based on organizational structure as in the work of Crook[9], UML-based [16], [11] method for the extraction of privacy requirements from organizations privacy requirements, and scenario-driven methods established for predefined set of tasks and scenarios [10]. Jorshari et al. work [17] focused on eliciting the security requirements in general without making the approach close enough to be adapted for extracting privacy requirements. Darimont et al [17] proposed a Goal-Oriented Requirements Engineering (GORE) approach to classify rules and form goals where those goals are then refined in an incremental fashion until all related tasks, actors, and uses-cases are discovered and extracted. 6. CONCLUSIONS In this work, we proposed a framework to model the privacy requirements from regulatory text and to extract the possible context elements in the form roles, purposes, and obligations. The framework is designed to overcome the traditional complexities and challenges that face laws and regulations modeling. The framework consists of multiple steps starting by closely inspecting and analyzing the regulatory text to identify the parts of interest of the law that is related to the privacy requirements. Then it clarifies ambiguities from the letter of the law by resolving cross- references, dependencies, and handling rules exceptions. Next, a Goal-Driven approach is applied to examine the identified targeted rules text to extract all keywords that may define a context element. In a later phase of this research, the context elements extracted using this framework will be used to create privacy policies as well as in the decision engine in an access control model. In order to implement such a model, the next phase will also include identifying the decision engine logic and the specification language that will be used for privacy policy representation. REFERENCES [1] Health Insurance Portability and Accountability Act of 1996. Public Law 104-191., vol. 110. 1996, pp. 1936–2103. [2] Gramm-Leach-Bliley Act of 1999. Public Law 106-102. Senate Banking Committee, 1999. [3] Sarbanes-Oxley Act of 2002. Public Law 107-204. 2002. [4] a. I. Anton, J. B. Earp, C. Potts, and T. a. Alspaugh, “The role of policy and stakeholder privacy values in requirementsnengineering,” Proc. Fifth IEEE Int. Symp. Requir. Eng., no. August, pp. 1– 12, 2001. [5] S. J. Dwyer III, A. C. Weaver, and K. K. Hughes, “Health Insurance Portability and Accountability Act,” Secur. Issues Digit. Med. Enterp., vol. 72, no. 2, pp. 9–18, 2004.
  • 10. Health Informatics - An International Journal (HIIJ) Vol.5, No.1, February 2016 10 [6] C. S. Powers, P. Ashley, and M. Schunter, “Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control,” Proceedings. Third Int. Symp. Electron. Commer., pp. 13–21, 2002. [7] J. Williams, “Role-based access control models for E-healthcare systems,” Florida A&M Univ. Dep. Comput. Inf. Sci., 2007. [8] P. N. Otto and A. I. Anton, “Addressing Legal Requirements in Requirements Engineering,” in Requirements Engineering Conference, 2007. RE ’07. 15th IEEE International, 2007, pp. 5, 14, 15. [9] R. Crook, W. Hall, and M. Keynes, “Towards an Analytical Role Modelling Framework for Security Requirements,” in Proc. of the 8 th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ’02), 2002, pp. 1–14. [10] G. Neumann and M. Strembeck, “A Scenario-driven Role Engineering Process for Functional RBAC Roles,” in Proc. of the 7 th ACM Symposium on Access Control Models and Technologies (SACMAT’02), 2002, pp. 33–42. [11] P. Epstein and R. Sandhu, “Towards A UML Based Approach to Role Engineering,” in Proc. of the 4 th ACM Workshop on Role-Based Access Control (RBAC’99), 1999, pp. 135–143. [12] F. Jorshari, H. Mouratidis, and S. Islam, “Extracting security requirements from relevant laws and regulations,” in Sixth International Conference on Research Challenges in Information Science (RCIS), 2012, pp. 1–9. [13] W. N. Hohfeld, “Fundamental Legal Conceptions as Applied in Judicial Reasoning,” Yale Law J., vol. 26, no. 8, pp. 710–770, Jun. 1917. [14] A. Siena, J. Mylopoulos, A. Perini, and A. Susi, “From Laws to Requirements,” in Requirements Engineering and Law, 2008. RELAW ’08, 2008, pp. 6–10. [15] T. D. Breaux and A. I. Anto´n, “Analyzing Regulatory Rules for Privacy and Security Requirements,” IEEE Trans. Softw. Eng., vol. 34, no. 1, pp. 5–20, 2008. [16] S. H. Houmb, S. Islam, E. Knauss, J. Jürjens, and K. Schneider, “Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec,” Requir. Eng. J., vol. 15, no. 1, pp. 63–93, 2010. [17] R. Darimont, M. Lemoine, and B. Cediti, “Goal-oriented Analysis of Regulations,” in REMO2V06: Int. Workshop on Regulations Modelling and their Verification & Validation, 2006, pp. 838–844.