This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "October 4, 2011 Security Conference Call"

From HL7Wiki
Jump to navigation Jump to search
(Created page with "=Security Working Group Meeting= * Meeting Information Back to Security Main Page ==Attendees== (expected) * [mailto:bernd.blobel@ehealth-cc.de Bernd...")
 
 
Line 4: Line 4:
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]
  
==Attendees== (expected)
+
==Attendees==  
  
* [mailto:bernd.blobel@ehealth-cc.de Bernd Blobel] Security Co-chair, absent
 
* [mailto:bbraithwaite@anakam.com  Bill Braithwaite, MD]
 
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
 
* [mailto:Kathleen_Connor@comcast.net Kathleen Connor]
 
+
* [mailto:ecoyne@hpti.com Ed Coyne]
* [mailto:thomas.davidson@ssa.gov Tom Davidson]
+
* [mailto:mike.davis@va.gov Mike Davis] Security Co-chair, absent
* [mailto:mike.davis@va.gov Mike Davis] Security Co-chair
 
 
* [mailto:farmer@apelon.com Jon Farmer]
 
* [mailto:farmer@apelon.com Jon Farmer]
 
* [mailto:gonzaleswebs@saic.com Suzanne Gonzales-Webb] CBCC Co-chair
 
* [mailto:gonzaleswebs@saic.com Suzanne Gonzales-Webb] CBCC Co-chair
* [mailto:rhamm@gmail.com Russ Hamm]
+
* [mailto:glen@grok-a-lot.com Glen Marshall]
 
 
* [mailto:robert.horn@agfa.com Rob Horn]
 
* [mailto:michelle.johnston2@va.gov Michelle Johnston]
 
* [mailto:djorgenson@inpriva.com Don Jorgenson]
 
* [mailto:glen@grok-a-lot.com Glen Marshalll]
 
* [mailto:rmcclure@apelon.com Rob McClure]
 
  
 
* [mailto:john.moehrke@med.ge.com John Moehrke] Security Co-chair
 
* [mailto:john.moehrke@med.ge.com John Moehrke] Security Co-chair
* [mailto:milan.petkovic@phillips.com Milan Petkovic]
 
* [mailto:ppyette@inpriva.com Pat Pyette]
 
* [mailto:diana.proud-madruga@va.gov Diana Proud-Madruga]
 
* [mailto:scott.m.robertson@kp.org Scott Robertson]
 
 
* [mailto:kenneth.salyards@samhsa.hhs.gov Ken Salyards]
 
* [mailto:kenneth.salyards@samhsa.hhs.gov Ken Salyards]
 
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Co-chair
 
* [mailto:richard.thoreson@samhsa.hhs.gov Richard Thoreson] CBCC Co-chair
* [mailto:ioana@eversolve.com Ioana Singureanu]
 
* [mailto:david.staggs@va.gov David Staggs]
 
* [mailto:serafina@eversolve.com Serafina Versaggi]
 
 
* [mailto:weida@apelon.com Tony Weida]
 
* [mailto:weida@apelon.com Tony Weida]
* [mailto:craig.winter@va.gov Craig Winter]
 
  
[[Security|Back to Security Main Page]]
+
 
 +
==Agenda/Discussion:==
 +
'''Roll Call'''
 +
 
 +
 
 +
‘'''No prior meeting minutes to approve at this time'''
 +
 
 +
As this is the first meeting back post the plenary meeting, it was suggested that Agenda items be compiled for more detailed discussion at the meeting.  These items will compose the 10/11/2011 meeting agenda.
 +
 
 +
 
 +
'''Inclusion of International Security Members'''
 +
* Suggestion to updating call to set up at 12M q3rd week, confirm if an additional call or updating one call a week to new time.
 +
 
 +
 
 +
Continuing of '''Security and Privacy Ontology work'''
 +
* Assigned to Tony Weida, Ed Coyne (?)
 +
 
 +
 
 +
'''Increase active role in ‘’Refactor of Confidentiality Codes’’ a CBCC-sponsored project'''
 +
* Do we need to discuss during Security meeting or to continue discussion during CBCC meetings only?
 +
*Incorporate the use case – manage, assign, receive when then get confidentiality codes; these need to be further defined in the Security-Privacy DAM (one of the project scope deliverables for the Refactor Confidentiality Code project) 
 +
*Answer the question:  How are implementers supposed to use this?  Proposing an obligation vocabulary which would contain metadata…obligation code would be:  (see Mike’s paper for details) and see if a combination of this can be directed toward harmonization in March. (An identified pathway); intended to be joint work between CBCC and Security.
 +
** '''ACTION ITEM: '''  ''consider amending the refactor project scope or create a new project for the security portion. '' Where the obligations be carried will be different---they are a metadata of the transaction;  further discussion (meta data vs. payload) needed.  This piece is also missing from the Security-Privacy DAM.  Also, between ontology and other vocabularies in the DAM that need to be enumerated in the US-realm.  Have a catalog of existing code-sets that relate to the DAM and inspect and see if they are useful/restricted to the US Domain.  Between that work and code-sets and confidentiality codes this will not perform surgery in those code-sets…some of this is also being done in the ontology work.  (ontology work—international or US realm?  Currently  restricting to US to start, but would like to expand to international)
 +
 
 +
 
 +
'''EHR Functional Model'''
 +
Assistance requested  in closing the Security-related comments on the EHR Functional Model ballot; on how they want their catalog to be used.  John Moehrke is looking for volunteers to walk through the public comments--to assist EHR WG dispose of these comments. Entails a few meetings, accept/modify the comments and return information to the EHR WG with results.  Please contact:  [mailto:john.moehrke@med.ge.com John Moehrke] (Kathleen has volunteered to assist)
 +
 
 +
* '''Meta-data for EHR functional model; project on meta-data criteria for HIE'''
 +
Presented to EHR WG but unsure if a formal project has been established.  (Relation to HHS-ONC…xxx information.)
 +
 
 +
 
 +
'''S&I Framework''' – (discussion item) overview report to make sure we are all on the same page with other work going on.  Discussion of any overlap.
  
  
==Agenda==
+
'''Data Segmentation''' (note there is call overlap, John Moehrke will be attending this call)
#''(05 min)'' Roll Call, Approve Minutes & Accept Agenda
 
#''(15 min)'' '''Item1'''
 
#''(15 min)'' '''Item2'''
 
#''(15 min)'' '''Item3'''
 
#''(5 min)'' '''Other Business'''
 
  
==Action Items==
+
No other topics were brought up for discussion, meeting closed at 1100 PST / 1400 EST
  
 
[[Security|Back to Security Main Page]]
 
[[Security|Back to Security Main Page]]

Latest revision as of 07:09, 9 October 2011

Security Working Group Meeting

Back to Security Main Page

Attendees


Agenda/Discussion:

Roll Call


No prior meeting minutes to approve at this time

As this is the first meeting back post the plenary meeting, it was suggested that Agenda items be compiled for more detailed discussion at the meeting. These items will compose the 10/11/2011 meeting agenda.


Inclusion of International Security Members

  • Suggestion to updating call to set up at 12M q3rd week, confirm if an additional call or updating one call a week to new time.


Continuing of Security and Privacy Ontology work

  • Assigned to Tony Weida, Ed Coyne (?)


Increase active role in ‘’Refactor of Confidentiality Codes’’ a CBCC-sponsored project

  • Do we need to discuss during Security meeting or to continue discussion during CBCC meetings only?
  • Incorporate the use case – manage, assign, receive when then get confidentiality codes; these need to be further defined in the Security-Privacy DAM (one of the project scope deliverables for the Refactor Confidentiality Code project)
  • Answer the question: How are implementers supposed to use this? Proposing an obligation vocabulary which would contain metadata…obligation code would be: (see Mike’s paper for details) and see if a combination of this can be directed toward harmonization in March. (An identified pathway); intended to be joint work between CBCC and Security.
    • ACTION ITEM: consider amending the refactor project scope or create a new project for the security portion. Where the obligations be carried will be different---they are a metadata of the transaction; further discussion (meta data vs. payload) needed. This piece is also missing from the Security-Privacy DAM. Also, between ontology and other vocabularies in the DAM that need to be enumerated in the US-realm. Have a catalog of existing code-sets that relate to the DAM and inspect and see if they are useful/restricted to the US Domain. Between that work and code-sets and confidentiality codes this will not perform surgery in those code-sets…some of this is also being done in the ontology work. (ontology work—international or US realm? Currently restricting to US to start, but would like to expand to international)


EHR Functional Model Assistance requested in closing the Security-related comments on the EHR Functional Model ballot; on how they want their catalog to be used. John Moehrke is looking for volunteers to walk through the public comments--to assist EHR WG dispose of these comments. Entails a few meetings, accept/modify the comments and return information to the EHR WG with results. Please contact: John Moehrke (Kathleen has volunteered to assist)

  • Meta-data for EHR functional model; project on meta-data criteria for HIE

Presented to EHR WG but unsure if a formal project has been established. (Relation to HHS-ONC…xxx information.)


S&I Framework – (discussion item) overview report to make sure we are all on the same page with other work going on. Discussion of any overlap.


Data Segmentation (note there is call overlap, John Moehrke will be attending this call)

No other topics were brought up for discussion, meeting closed at 1100 PST / 1400 EST

Back to Security Main Page