This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "December 11, 2012 Security Working Group Conference Call"

From HL7Wiki
Jump to navigation Jump to search
Line 32: Line 32:
 
'''WGM Agenda'''
 
'''WGM Agenda'''
 
Agenda request from Jennifer Sisto to have 20 minutes during the joint session to discuss/update/report out on DS4P - ''Data Segmentation for Privacy''
 
Agenda request from Jennifer Sisto to have 20 minutes during the joint session to discuss/update/report out on DS4P - ''Data Segmentation for Privacy''
** advantage of internation member attendance, greater audience available during the week
+
* advantage of internation member attendance, greater audience available during the week
** per Suzanne recommended 20 minutes toward the end of Q3.  If continued or more detailed discussion is needed, time can be alloted during the WGM at CBCC or Security  
+
* Suggest 20 minutes toward the end of Q3 per Suzanne.  If continued or more detailed discussion is needed, time can be alloted during the WGM during CBCC or Security Q's
  
 
'''Security and Privacy Ontology''' Tony Weida
 
'''Security and Privacy Ontology''' Tony Weida
Line 40: Line 40:
 
** Perspective of the work group; single person, single-user organization—poicy they are making—does that open a security gap into the EHR/PHR world?; technically you are levaing in the hands of the sole-…  
 
** Perspective of the work group; single person, single-user organization—poicy they are making—does that open a security gap into the EHR/PHR world?; technically you are levaing in the hands of the sole-…  
 
** Set the standards for the guidance and policy--- if records are compromised, --- we can only do so much
 
** Set the standards for the guidance and policy--- if records are compromised, --- we can only do so much
Row 10 – Suzanne’s comments; primarily editorial
+
Row 10 – Suzanne’s comments reviewed and accepted
* Recommend another source other than a wikipedia for ‘ontology’  citing: http://tomgruber.org/writing/ontology-definition-2007.htm agreed by Suzanne & Bill
+
* Recommend another source other than a wikipedia for ‘ontology’  citing: http://tomgruber.org/writing/ontology-definition-2007.htm agreed by Suzanne & Bill B
* remainder of  
+
* remainder of comments require Mike Davis and/or John Moehrke and will be pushed to next week's agenda when one or both are available.
  
'''Security and CBCC WG''' should consider repsonding to
+
'''Security and CBCC WG''' Security and Privacy response. <to be added>  
related to privacy and security. One area in particular (per Kathleen)
 
Suggeseted wording to bring forward for HL7? NSTIC quesitons--what do we know about 3rd party credentials and what do we have to say about it?
 
 
ACTION ITEM:  Kathleen to send out question to the Security/CBCC WG for assitance  with response.   
 
ACTION ITEM:  Kathleen to send out question to the Security/CBCC WG for assitance  with response.   
  

Revision as of 23:29, 11 December 2012

Security Working Group Meeting

Back to Security Main Page

Attendees

Back to Security Main Page

Agenda

  1. (05 min) Roll Call, Approve Minutes Security Working Group Conference Call Minutes & Accept Agenda
  2. (05 min) HL7 WGM- Phoenix, Arizona, USA Security WG - AGENDA - DRAFT posted
  3. (15 min) Security and Privacy Ontology Ballot reconciliation (continued)
  4. (15 min) Item3
  5. (05 min) Other Business

Meeting Minutes

Roll Call, Approve Minutes & Accept Agenda


WGM Agenda Agenda request from Jennifer Sisto to have 20 minutes during the joint session to discuss/update/report out on DS4P - Data Segmentation for Privacy

  • advantage of internation member attendance, greater audience available during the week
  • Suggest 20 minutes toward the end of Q3 per Suzanne. If continued or more detailed discussion is needed, time can be alloted during the WGM during CBCC or Security Q's

Security and Privacy Ontology Tony Weida John Snyder provided some comments

  • Concerned with rows 92, 93
    • Perspective of the work group; single person, single-user organization—poicy they are making—does that open a security gap into the EHR/PHR world?; technically you are levaing in the hands of the sole-…
    • Set the standards for the guidance and policy--- if records are compromised, --- we can only do so much

Row 10 – Suzanne’s comments reviewed and accepted

  • Recommend another source other than a wikipedia for ‘ontology’ citing: http://tomgruber.org/writing/ontology-definition-2007.htm agreed by Suzanne & Bill B
  • remainder of comments require Mike Davis and/or John Moehrke and will be pushed to next week's agenda when one or both are available.

Security and CBCC WG Security and Privacy response. <to be added> ACTION ITEM: Kathleen to send out question to the Security/CBCC WG for assitance with response.

Other Business

Action Items

Back to Security Main Page