This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

February 16th 2010 Security Conference Call

From HL7Wiki
Jump to navigation Jump to search

Security Work Group Weekly Conference Call

Meeting Information

Attendees

Agenda

  1. (05 min) Roll Call, Approve Minutes Feb 9, 2010 & Call for Additional Agenda Items
  2. (20 min) Review WG response to Meaningful Use IFR - endorse comments and submit to HL7 leadership
  3. (10 min) DRAFT Harmonized Security and Composite Privacy Domain Analysis Model - Draft will be circulated for Peer Review by COB today
  4. (25 min) Privacy Policy Templates Scope Statement (CBCC Agenda item)
  5. (15 min) Ioana - present a sample CDA R2 Consent Directive Document (CBCC Agenda item moved to next week's agenda)
  6. (05 min) Call for next week's agenda items

Minutes

1. Action Items

  • Team: Homework for next week's Security and CBCC WG meeting - Complete peer review of the DRAFT Harmonized Security & Composite Privacy Domain Analysis Model. Please bring comments/questions to next week's meeting
  • Mike: send the Security/CBCC WG endorsed comments in response to MU IFR to the HL7 Policy Committee

2. Resolutions

3. Announcements - None

4. Discussion

Security/CBCC WG Response to Meaningful Use IFR

  • Glen Marshall and John Moehrke submitted their response to the IFR to the Security and CBCC lists. Their response included comments that were Security/Privacy specific, but also included comments that were not HL7-specific and already submitted on behalf of other SDOs in which they are involved.
  • Given no additional comments were forthcoming from Security and CBCC WGs, it was decided that Glen and John’s comments would be submitted to the HL7 Policy Committee.
  • Pat Pyette made a motion to endorse the comments/response to the MU IFR submitted Glen Marshall and John Moehrke to the Security/CBCC lists for inclusion with the general comments submitted by HL7 to the ONC.
  • Mike made a friendly amendment that only those comments relevant to HL7 be endorsed by the Work Groups.

The motion was seconded by Glen Marshall Vote: 11/1/0 (approve/abstain/oppose)

Ontology Project

  • Scope statement was reviewed by the Foundation & Technology Steering Division last week. Mike was unable to attend that meeting and the committee had questions about the scope statement. They will review the scope statement next week and Mike and Steve will be there to address their questions
    • The main question about the project posed by the F&T Steering Division is whether this is a modeling or vocabulary project since typically HL7 projects are one or the other and this project appears to cross boundaries. The SOA WG also confronted this question when presenting the SOA Ontology project to the FTSD.
    • They also felt it was unclear as to what is being defined by this ontology and need assurance that the Vocabulary work group principals and methods for defining code systems will be followed.
  • Steve volunteered to update the scope statement based on questions and will attend next week’s meeting with Mike
  • The project has been reviewed with Russ Hamm and others on the Vocabulary WG and they are supportive of this effort
  • This project will be an on-going effort, and the plan is to work on this steadily on this project. The initial task includes exploring ontology tools in collaboration with SOA as they proceed with their Ontology project
  • Glen questioned whether having two government implementers for this effort might be off-putting to organizations outside of the government or the US. Mike welcomed any and all parties to join the project as implementers
    • The F&T Steering Division had similar questions for the SOA WG about their Ontology project scope statement (whether it’s a Vocabulary or modeling project). The SOA Ontology project is not being balloted as DSTU, and therefore does not require implementers.
  • Glen raised the concern that a strictly health care specific and/or HL7 perspective could be problematic, as DICOM has some concepts that are not included in the RIM
    • Security Privacy services must acquire context values from systems that are not RIM-aware
    • Security/Privacy services must acquire context values that are not health care specific but should share the same security privacy infrastructure.
    • European privacy laws are not health care specific – they are simply privacy laws. We have to be open to different models, both social and legal
    • We also have to consider data that is structured or unstructured that are not in conformance with the RIM – PHR products. To presume this is RIM-map-able is not borne out in the real world
  • The VA is providing two additional part-time resources on the Security/Privacy Ontology project
    • Michelle Johnson – Security Software applications
    • Clinical Informatics intern –exploring some tools and will report back
  • Tooling:
    • Protégé and other tools will be investigated to determine how they integrate with HL7 tools. See Ontology Tools
    • TopGrade isnot open source, but may have some advantages over Protége
  • Bernd mentioned that ISO TC215 has been working on this for some time. There may be artifacts that may be developed in ISO that we can take advantage of. Steve mentioned that it would be helpful to identify those artifacts.
  • As we move forward, it will be important to figure out how to work with Bernd, as he has offered to participate in this project as he has volunteered to participate. Mike will determine how to schedule a convenient time to meet.
  • As we don’t have any procedures to move forward with this project, Glen’s advice is to document the process that is used in this project. This is important for the SOA Ontology project as well, and an effort will be made to coordinate this effort as well.

Meeting was adjourned at 1:54 PM EST.