This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "Security and Privacy Tutorial 2012"

From HL7Wiki
Jump to navigation Jump to search
(Created page with "=Free Tutorial given at Baltimore 2012= First Quarter * Cookbook for Security Considerations -- John Moehrke Second Quarter * [http://gforge.hl7.org/gf/download/docmanfilev...")
 
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
=Free Tutorial given at Baltimore 2012=
 
=Free Tutorial given at Baltimore 2012=
 +
This session will focus on how to apply security and privacy to the health IT standards. It will cover the basics of security and privacy using real-world examples. The session will explain how each phase of design needs to consider risks to security and privacy to best design security and privacy in; and mechanisms for flowing risks down to the next phase of design. In addition, it will cover the security and privacy relevant standards that HL7 has to offer including: Role-Based-Access-Control Permissions, Security/Privacy ontology, ConfidentialityCode, CDA Consent Directive, Access Control Service, Audit Control Service, and others. These standards and services will be explained in the context of providing a secure and privacy protecting health IT environment.
  
 
First Quarter
 
First Quarter
 
* [[Cookbook for Security Considerations]] -- John Moehrke
 
* [[Cookbook for Security Considerations]] -- John Moehrke
 +
** HL7 gForge folder with resources http://gforge.hl7.org/gf/project/security/docman/?subdir=144
 +
** [http://gforge.hl7.org/gf/download/docmanfileversion/6462/8721/HL7_Security_WG_Risk_Assessment_Cookbook_Tutorial_7.7_20110915.ppt Tutorial Presentation on the Security Risk Assessment Cookbook] Version 7.7
 +
** [http://gforge.hl7.org/gf/download/docmanfileversion/5519/7013/Stds_20100107_SW_7.4_HL7_Security_Cookbook_v2.41_DRAFT.docx Formal Security Cookbook Paper] Version 2.41
  
 
Second Quarter
 
Second Quarter

Latest revision as of 17:11, 24 September 2012

Free Tutorial given at Baltimore 2012

This session will focus on how to apply security and privacy to the health IT standards. It will cover the basics of security and privacy using real-world examples. The session will explain how each phase of design needs to consider risks to security and privacy to best design security and privacy in; and mechanisms for flowing risks down to the next phase of design. In addition, it will cover the security and privacy relevant standards that HL7 has to offer including: Role-Based-Access-Control Permissions, Security/Privacy ontology, ConfidentialityCode, CDA Consent Directive, Access Control Service, Audit Control Service, and others. These standards and services will be explained in the context of providing a secure and privacy protecting health IT environment.

First Quarter

Second Quarter