This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "October 30, 2012 Security Working Group Conference Call"

From HL7Wiki
Jump to navigation Jump to search
 
(4 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
*[[Security| Meeting Information]]
 
*[[Security| Meeting Information]]
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]
 
 
Please join my meeting, Tuesday, October 30, 2012 at 2:15 PM Pacific Daylight Time.
 
https://www1.gotomeeting.com/join/380067256
 
 
Use your microphone and speakers (VoIP) - a headset is recommended.  Or, call in using your telephone.
 
 
Dial +1 (619) 550-0003
 
Access Code: 380-067-256
 
Audio PIN: Shown after joining the meeting
 
 
Meeting ID: 380-067-256
 
 
 
==Attendees==
 
==Attendees==
 
* [mailto:bill.braithwaite@equifax.com Bill Braithwaite]
 
* [mailto:bill.braithwaite@equifax.com Bill Braithwaite]
* [mailto:jcarter@apelon.com John Carter]
+
*[mailto:jcarter@apelon.com John Carter]
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
* [mailto:d
+
*[mailto:rdgelzer@docintegrity.com Reed D. Gelzer]
* [mailto:rdgelzer@docintegrity.com Reed D. Gelzer]
+
*[mailto:ajames@drc.com Adrienne James]
* [mailto:AJames@drc.com Adrianne James]
+
* [mailto:palm@palmcorp.com Paul L Petronelli]
* [mailto:harry.rhodes@ahima.org Harry Rhodes]
+
*[mailto:Harry.Rhodes@ahima.org Harry Rhodes]
* [mailto:robert.horn@agfa.com Rob Horn]
+
*[mailto:arnie@mitre.org Arnie Rosenthal]
* [mailto:jim.kretz@samhsa.hhs.gov Jim Kretz]
+
*[mailto:Serafina.Versaggi@gmail.com Serafina Versaggi]
* [mailto:ted.lesueur.com Ted Lesueur]
 
* [mailto:milan.petkovic@phillips.com Milan Petkovic]
 
* [mailto:kenneth.salyards@samhsa.hhs.gov Ken Salyards]
 
 
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Cochair
 
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Cochair
* [mailto:serafina.versaggi@gmail.com Serafina Versaggi]
+
[[Security|Back to Security Main Page]]
 
 
[[Security|Back to Security Main Page]]
 
 
 
 
==Agenda==
 
==Agenda==
 
#''(05 min)'' '''Roll Call, Approve [http://wiki.hl7.org/index.php?title=October_23,_2012_Security_Working_Group_Conference_Call October 23, 2012 Security Working Group Conference Call]  Security Working Group Conference Call Minutes]  & Accept Agenda'''
 
#''(05 min)'' '''Roll Call, Approve [http://wiki.hl7.org/index.php?title=October_23,_2012_Security_Working_Group_Conference_Call October 23, 2012 Security Working Group Conference Call]  Security Working Group Conference Call Minutes]  & Accept Agenda'''
Line 40: Line 21:
 
#''(05 min)'' '''Other Business, Agenda for Next call, Action Items, and Wrap Up
 
#''(05 min)'' '''Other Business, Agenda for Next call, Action Items, and Wrap Up
 
==Minutes==
 
==Minutes==
*RE:  Approval of Minutes and Agenda – There was no CoChair present so the prior week's meeting minutes were not voted on for approval.
+
*RE:  '''Approval of Minutes and Agenda''' – There was no cochair so we held an informal discussion call.
*RE:  HCS Ballot Update - Kathleen stated that Mike plans to merge his work with what he is calling the security labeling system. The diagram can be found on the security wiki. This is the process for applying security labels. At this time, the goal is trying to figure out which EHR is responsible for applying access labels.
+
*RE:  '''HCS Ballot Update''' – Kathleen reported that the Notices of Intent for Ballot for both HCS and Ontology have been submitted, as well as the Nov. Harmonization proposals.
*RE: S&P Ontology Ballot Update - John stated that the notice of intent to ballot in January had been received. Tony Weida who worked on the ontology task order that expired earlier this year is working with John again. The expiration of the task order put the work on hold. The new task order was awarded and started last month. Tony is working part time consulting on this task order. First order of business is to figure out what needs to be done to get Ontology back on schedule and to push it through for balloting.  
+
*RE:   '''S&P Ontology Ballot Update''' – John Carter reported that they are recruiting Tony to help prepare the ballot for January.
*RE: TBD Topic - Security Integrity Observation – Discussion was about the integrity of the provenances that are being brought into agencies. There was a brief discussion about security integrity observation – Kathleen showed the HL7 Security observation vocabulary labels for security integrity observation. Specifically she showed the observation types and values and sub categories that can be used on a security label. You can use the values and types that you already have to hook to create the security labels.
+
*RE:  '''RM-ES and Security WGs areas of shared metadata scope''' - Group discussed need for interoperable records management and security metadata, use of provenance and integrity completion, confidence, and data alteration. Some of those concerns are already supported by HL7 v.2 and v.3 with classes for author, data enterer, and informant, and class attributes such as status, uncertainty code, and DocumentCompletion, as well as mechanisms for tracking amendments such as snap-shot and update mode. It would be helpful to map those to RM-ES functional requirements related to information exchange. 
*RE:  Other Business, Agenda for Next call, Action Items, and Wrap Up - Adding Security Integrity Observation to the agenda.  
+
In addition, RM-ES WG may want to review the current records management standards documented in HL7 v.2 Chapter 9 and HL7 v.3 Medical Records Domain to see what they can leverage for their profile.
 
+
Arnie noted that there is a sophisticated body of work on provenance tracking that should be considered.  Inclusion of that work would be helpful for ensuring the semantic interoperability and ability of provenance enabled systems to consume the provenance metadata used for information exchange.
 
+
Reed provided a number of examples where use of information exchange concepts like “legal authenticator” are used differently and perhaps inappropriately, and noted the need for some means to enforce a standard definition and use of these concepts especially given their importance to payers and to initiatives such as edMS.
Meeting adjourned at 6:00 PM Eastern
+
Harry and Kathleen discussed the manner in which CDA R2 can convey [0...*] legal authenticator, author, informant, and data enterer at the document level, as well as allow [0...*] different author and informant at the Section and Entry levels.  What seems to be lacking is the ability to provide author/informant information about entry level classes that are being reported “second-hand”.  This would be helpful for tracking the entities from which the CDA entry authors received the entry information being conveyed when the entry author or informant are not the originators.
 
+
*RE:  Other Business, Agenda for Next call, Action Items, and Wrap Up
 +
Participants agreed that it would be helpful have further discussions about metadata that support record management and security.
 +
Meeting adjourned at 2:00 PM Eastern
 
==Action Items==
 
==Action Items==
*RE: Adrianne,Suzanne and Kathleen will get the security integrity observation topic on the agenda for future discussion.
+
*RE: Kathleen to fix links to Mike’s HCS presentation
 
+
*RE: Adrienne and Kathleen to collaborate on minutes
 +
==Reference Material from Call==
 +
* [[Image: Security_Observation_Vocabulary.png|600px|thumb|left|Diagram of the components of a healthcare security labeling system]]
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]

Latest revision as of 03:51, 31 October 2012

Security Working Group Meeting

Back to Security Main Page

Attendees

Back to Security Main Page

Agenda

  1. (05 min) Roll Call, Approve October 23, 2012 Security Working Group Conference Call Security Working Group Conference Call Minutes] & Accept Agenda
  2. (20 min) HCS Ballot Update – Mike Davis
  3. (20 min) S&P Ontology Ballot Update - John Carter
  4. (10 min) TBD Topic
  5. (05 min) Other Business, Agenda for Next call, Action Items, and Wrap Up

Minutes

  • RE: Approval of Minutes and Agenda – There was no cochair so we held an informal discussion call.
  • RE: HCS Ballot Update – Kathleen reported that the Notices of Intent for Ballot for both HCS and Ontology have been submitted, as well as the Nov. Harmonization proposals.
  • RE: S&P Ontology Ballot Update – John Carter reported that they are recruiting Tony to help prepare the ballot for January.
  • RE: RM-ES and Security WGs areas of shared metadata scope - Group discussed need for interoperable records management and security metadata, use of provenance and integrity completion, confidence, and data alteration. Some of those concerns are already supported by HL7 v.2 and v.3 with classes for author, data enterer, and informant, and class attributes such as status, uncertainty code, and DocumentCompletion, as well as mechanisms for tracking amendments such as snap-shot and update mode. It would be helpful to map those to RM-ES functional requirements related to information exchange.

In addition, RM-ES WG may want to review the current records management standards documented in HL7 v.2 Chapter 9 and HL7 v.3 Medical Records Domain to see what they can leverage for their profile. Arnie noted that there is a sophisticated body of work on provenance tracking that should be considered. Inclusion of that work would be helpful for ensuring the semantic interoperability and ability of provenance enabled systems to consume the provenance metadata used for information exchange. Reed provided a number of examples where use of information exchange concepts like “legal authenticator” are used differently and perhaps inappropriately, and noted the need for some means to enforce a standard definition and use of these concepts especially given their importance to payers and to initiatives such as edMS. Harry and Kathleen discussed the manner in which CDA R2 can convey [0...*] legal authenticator, author, informant, and data enterer at the document level, as well as allow [0...*] different author and informant at the Section and Entry levels. What seems to be lacking is the ability to provide author/informant information about entry level classes that are being reported “second-hand”. This would be helpful for tracking the entities from which the CDA entry authors received the entry information being conveyed when the entry author or informant are not the originators.

  • RE: Other Business, Agenda for Next call, Action Items, and Wrap Up

Participants agreed that it would be helpful have further discussions about metadata that support record management and security. Meeting adjourned at 2:00 PM Eastern

Action Items

  • RE: Kathleen to fix links to Mike’s HCS presentation
  • RE: Adrienne and Kathleen to collaborate on minutes

Reference Material from Call

Back to Security Main Page