This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "June 18, 2013 Security WG Conference Call"

From HL7Wiki
Jump to navigation Jump to search
 
(4 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
==Attendees==
 
==Attendees==
  
* [mailto:bill.braithwaite@equifax.com Bill Braithwaite]
 
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
 
* [mailto:mike.davis@va.gov Mike Davis] Security Co-chair
 
* [mailto:mike.davis@va.gov Mike Davis] Security Co-chair
* [mailto:r.gelzer@myfairpoint.net Reed Gelzer]
+
* [mailto:Michael.Dufel@jerichosolutions.com Mike Dufel], Jericho Solutions
 +
* [mailto: Duane Decouteau}
 
* [mailto:sgonzales-webb@drc.com Suzanne Gonzales-Webb] CBCC Co-chair
 
* [mailto:sgonzales-webb@drc.com Suzanne Gonzales-Webb] CBCC Co-chair
 +
* [mailto: Brian Handpicker]
 
* [mailto:ajames@drc.com Adrianne James]  
 
* [mailto:ajames@drc.com Adrianne James]  
* [mailto:djorgenson@inpriva.com Don Jorgenson]
 
* [mailto:jim.kretz@samhsa.hhs.gov Jim Kretz]
 
  
 
* [mailto:john.moehrke@med.ge.com John Moehrke] Security Co-chair
 
* [mailto:john.moehrke@med.ge.com John Moehrke] Security Co-chair
 
* [mailto:dproud-madruga@drc.com Diana Proud-Madruga]
 
* [mailto:dproud-madruga@drc.com Diana Proud-Madruga]
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Co-chair
+
* [mailto: Harry Rhoades]
 +
* [mailto:david.staggs@jerichosystems.com David Staggs], Jericho Systems
 
* [mailto:weida@apelon.com Tony Weida]
 
* [mailto:weida@apelon.com Tony Weida]
* [mailto:trish.williams@ecu.edu.au Trish Williams]
 
  
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]
Line 26: Line 25:
 
#''(05 min)'' Roll Call, Approve Minutes & Accept Agenda
 
#''(05 min)'' Roll Call, Approve Minutes & Accept Agenda
 
#''(15 min)'' '''Update on Conformance Statements  '''  Tony Weida
 
#''(15 min)'' '''Update on Conformance Statements  '''  Tony Weida
#''(15 min)'' '''Item2 '''
 
#''(15 min)'' '''Item3'''
 
#''(05 min)'' '''Other Business'''
 
  
 
==Meeting Minutes==
 
==Meeting Minutes==
 
'''Roll Call, Approve Minutes & Accept Agenda'''
 
'''Roll Call, Approve Minutes & Accept Agenda'''
 +
Motion made to accept meeting minutes for June 4, June 11 and May 28. (Kahleen / Suzanne)
 +
No objections,, No obstations, motion passes (0/0/8)
  
  
''' Item 1'''  
+
'''Statement on Conformance''' Tony Weida
 +
 
 +
MOTION: //Security and Privacy Ontology//mark line 48 as persuasive (Kathleen / Tony)
 +
 
 +
No objections, No abstentions, motion passes (0/0/8)
 +
 
 +
from e-mail: 6/18/2013, 0815 AM PST
 +
''to support reconciliation of Comment 55 (and Comment 13), has been revised based on initial discussion during last week’s call.''
 +
 
 +
To expand on several column headings, a sub-ontology is considered …
 +
 
 +
* Extensible, if the sub-ontology MAY be imported into a new sub-ontology and augmented therein, e.g., by adding new classes (descendants or siblings of existing classes), so that the new sub-ontology may be used together with the original. 
 +
* Replaceable, if a different sub-ontology MAY be used instead.
 +
* Dynamic, if the most recent available version of a sub-ontology SHOULD be used, potentially a new version published after publication of the Security and Privacy Ontology specification.
 +
 
 +
''For example, making SensitivityOntology extensible permits additional types of sensitivity not presently represented in the corresponding HL7 vocabulary.  Making it replaceable supports a jurisdiction where a completely different set of sensitivity codes is mandated.  Making SensitivityOntology dynamic would enable it to track future harmonization changes.  (Although there was earlier discussion in favor of the dynamic approach as reflected in the May ballot document, discussion during last week’s call was opposed to dynamic  sub-ontologies; instead it was felt that the ontology specification should designate specific versions of HL7 vocabulary resources, namely, the latest versions at the time the ontology specification is published.)  ''
 +
 
 +
''Considering the preceding, conformance statements for SensitivityOntology could be revised to:''
 +
 
 +
''This sub-ontology is intended to have “static stability” in the parlance of HL7 “Core Principles” (26).  Thus it MUST represent the most recent harmonized version available for the HL7 v3 ActInformationSensitivityPolicy value set as of <MONTH DATE, YEAR>.  ''
 +
 
 +
''In a conforming application, sensitivity values SHOULD be selected via SensitivityOntology.owl.  For example, values of the OWL hasSensitivity property SHOULD be chosen from the preceding table.  If, in the process of deciding whether to allow an access request, a conforming application encounters a specified sensitivity value which it does not recognize, that access request SHALL be denied.''
 +
 
 +
''We noted that the current HL7 RBAC Healthcare Permission Catalog does not allow additional operations or objects.  Participants on the call advocated a similarly conservative approach for the corresponding sub-ontologies.  On the other hand, permissions in the HL7 RBAC Healthcare Permission Catalog were positioned as examples, so an extended or replacement set of permissions can be used, as long as they are built strictly from the normative operations and objects.''
 +
 
  
  

Latest revision as of 22:07, 18 June 2013

Security Working Group Meeting

Back to Security Main Page

Attendees

Back to Security Main Page

Agenda

  1. (05 min) Roll Call, Approve Minutes & Accept Agenda
  2. (15 min) Update on Conformance Statements Tony Weida

Meeting Minutes

Roll Call, Approve Minutes & Accept Agenda Motion made to accept meeting minutes for June 4, June 11 and May 28. (Kahleen / Suzanne) No objections,, No obstations, motion passes (0/0/8)


Statement on Conformance Tony Weida

MOTION: //Security and Privacy Ontology//mark line 48 as persuasive (Kathleen / Tony)

No objections, No abstentions, motion passes (0/0/8)

from e-mail: 6/18/2013, 0815 AM PST to support reconciliation of Comment 55 (and Comment 13), has been revised based on initial discussion during last week’s call.

To expand on several column headings, a sub-ontology is considered …

  • Extensible, if the sub-ontology MAY be imported into a new sub-ontology and augmented therein, e.g., by adding new classes (descendants or siblings of existing classes), so that the new sub-ontology may be used together with the original.
  • Replaceable, if a different sub-ontology MAY be used instead.
  • Dynamic, if the most recent available version of a sub-ontology SHOULD be used, potentially a new version published after publication of the Security and Privacy Ontology specification.

For example, making SensitivityOntology extensible permits additional types of sensitivity not presently represented in the corresponding HL7 vocabulary. Making it replaceable supports a jurisdiction where a completely different set of sensitivity codes is mandated. Making SensitivityOntology dynamic would enable it to track future harmonization changes. (Although there was earlier discussion in favor of the dynamic approach as reflected in the May ballot document, discussion during last week’s call was opposed to dynamic sub-ontologies; instead it was felt that the ontology specification should designate specific versions of HL7 vocabulary resources, namely, the latest versions at the time the ontology specification is published.)

Considering the preceding, conformance statements for SensitivityOntology could be revised to:

This sub-ontology is intended to have “static stability” in the parlance of HL7 “Core Principles” (26). Thus it MUST represent the most recent harmonized version available for the HL7 v3 ActInformationSensitivityPolicy value set as of <MONTH DATE, YEAR>.

In a conforming application, sensitivity values SHOULD be selected via SensitivityOntology.owl. For example, values of the OWL hasSensitivity property SHOULD be chosen from the preceding table. If, in the process of deciding whether to allow an access request, a conforming application encounters a specified sensitivity value which it does not recognize, that access request SHALL be denied.

We noted that the current HL7 RBAC Healthcare Permission Catalog does not allow additional operations or objects. Participants on the call advocated a similarly conservative approach for the corresponding sub-ontologies. On the other hand, permissions in the HL7 RBAC Healthcare Permission Catalog were positioned as examples, so an extended or replacement set of permissions can be used, as long as they are built strictly from the normative operations and objects.


Item 2


Item3


Other Business

Action Items

Back to Security Main Page