This wiki has undergone a migration to Confluence found Here
Difference between revisions of "April 17, 2012 Security Working Group Conference Call"
Jump to navigation
Jump to search
(Created page with "=Security Working Group Meeting= * Meeting Information Back to Security Main Page ==Attendees== * [mailto:Kathleen_Connor@comcast.net Kathleen Connor] *...") |
|||
Line 22: | Line 22: | ||
#''(40 min)'' '''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]Presentation and WG review''' - Kathleen Connor | #''(40 min)'' '''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]Presentation and WG review''' - Kathleen Connor | ||
#''(05 min)'' '''Action Items and possible next call agenda items: | #''(05 min)'' '''Action Items and possible next call agenda items: | ||
− | + | [http://gforge.hl7.org/gf/download/docmanfileversion/6744/9272/CDAR3SecurityandPrivacyIssues.pptx CDA R3 Security and Privacy Issues]and [http://gforge.hl7.org/gf/download/docmanfileversion/6742/9270/Act.confidentialityCode%E2%80%9CisDocumentCharacteristic%E2%80%9D%3Dtrue.pptx Act.confidentialityCode“isDocumentCharacteristic”=true]''' | |
− | |||
==Minutes== | ==Minutes== | ||
Line 39: | Line 38: | ||
'''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]''' | '''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]''' | ||
'''[http://gforge.hl7.org/gf/download/docmanfileversion/6744/9272/CDAR3SecurityandPrivacyIssues.pptx CDA R3 Security and Privacy Issues]''' | '''[http://gforge.hl7.org/gf/download/docmanfileversion/6744/9272/CDAR3SecurityandPrivacyIssues.pptx CDA R3 Security and Privacy Issues]''' | ||
− | '''[http://gforge.hl7.org/gf/download/docmanfileversion/6742/9270/Act.confidentialityCode%E2%80%9CisDocumentCharacteristic%E2%80%9D%3Dtrue.pptx Act.confidentialityCode “isDocumentCharacteristic”=true ''' | + | '''[http://gforge.hl7.org/gf/download/docmanfileversion/6742/9270/Act.confidentialityCode%E2%80%9CisDocumentCharacteristic%E2%80%9D%3Dtrue.pptx Act.confidentialityCode “isDocumentCharacteristic”=true]''' |
'''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]''' – Kathleen presented on NPRM provisions, questions, and proposed response. She will update presentation and comments per WG direction and submit to HL7 Policy Committee Wednesday April 18th. | '''[http://gforge.hl7.org/gf/download/docmanfileversion/6741/9269/MeaningfulUseStage2SecurityandPrivacyRequirements.pptx HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements]''' – Kathleen presented on NPRM provisions, questions, and proposed response. She will update presentation and comments per WG direction and submit to HL7 Policy Committee Wednesday April 18th. |
Revision as of 03:12, 17 April 2012
Security Working Group Meeting
Attendees
- Kathleen Connor
- Ed Coyne
- Mike Davis Security Co-chair
- Suzanne Gonzales-Webb CBCC Co-chair
- Goodlove Need his email address
- Jim Kretz
- Glen Marshall
- John Moehrke Security Co-chair
- Milan Petkovic
- Ken Salyards
- Richard Thoreson CBCC Co-chair
- Tony Weida
- Trish Williams
Agenda
- (05 min) Roll Call;Approve [[[April 10, 2012 Security Working Group Conference Call Minutes]]; Accept Agenda - Mike Davis
- (10 min) Action Item Status Updates - Mike Davis
- (40 min) HL7 Comments on Meaningful Use Stage 2 Security and Privacy RequirementsPresentation and WG review - Kathleen Connor
- (05 min) Action Items and possible next call agenda items:
CDA R3 Security and Privacy Issuesand Act.confidentialityCode“isDocumentCharacteristic”=true
Minutes
Mike asked for a Motion to accept Agenda and approve April 10 meeting minutes
Motion: ____, second: ____ ( - - )
Action Item Status Updates:
- Tony: Conduct email outreach by listserve and personal e-mails to Security WG to make sure people sign up to vote on the Ontology – [http://gforge.hl7.org/gf/download/docmanfileversion/6746/9274/May2012ballotmaterialforHL7SecurityandPrivacyOntologytw.msg See Tony’s Email Message
- John to follow up with EHR WG about Security’s interest in remaining cosponsor on EHR Metadata Profile project – See Email John’s Message
- Suzanne to follow up regarding:
- Ioana presentation on the System Requirements Tiger Team Example business workflow, metadata analysis (see 3/27 meeting minutes for detail)
- Start agenda template for May 2012 meeting
- Kathleen: Will follow up with material for
HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements CDA R3 Security and Privacy Issues Act.confidentialityCode “isDocumentCharacteristic”=true
HL7 Comments on Meaningful Use Stage 2 Security and Privacy Requirements – Kathleen presented on NPRM provisions, questions, and proposed response. She will update presentation and comments per WG direction and submit to HL7 Policy Committee Wednesday April 18th.
Other Business
Action Items
Meeting adjourned at ____PST Back to Security Main Page