This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

March 18, 2014 Security WG Conference Call

From HL7Wiki
Revision as of 22:03, 18 March 2014 by Suzannegw (talk | contribs)
Jump to navigation Jump to search

Back to Security Main Page

Attendees

Member Name Present Member Name Present Member Name Present
Mike Davis Security Co-chair x John Moehrke Security Co-chair x Trish Williams Security Co-chair
Bernd Blobel, Security Co-chair . Johnathan Coleman Kathleen Connor x
Duane DeCouteau x Reed Gelzer . Suzanne Gonzales-Webb CBCC Co-chair
Rick Grow x David Henkel x Mohammed Jafari x
Don Jorgenson . Diana Proud-Madruga x Harry Rhodes .
Ioana Singureanu . Richard Thoreson CBCC Co-chair . Ross Freeman .
Amanda Nash Walter Suarez . Tony Weida
. . .
. . .


Back to Security Main Page

Agenda

  1. (05 min) Roll Call, Approve March 11, 2014 Security WG Conference Call Minutes & Accept Agenda
  2. (20 min) Security and Privacy Ontology / Mind Map - Diana/Tony
  3. (20 min) Restructure Security Topic in v.3 Normative Edition - Kathleen
  4. (05 min) EHR MU 2015 Voluntary requirements – HL7 Policy response - Kathleen
  5. (15 min) July Harmonization – LOA Trust Vocabulary and Security Glossary Mohammad found - Kathleen
  6. (05 min) Other business, action items

Meeting Minutes DRAFT

Next Agenda (30min) for John Moehrke Informative discussion on OAuth and OpenID Connect to be done next meeting to have a better understanding in the Security WG in those activities

Approved March 11, 2014 Security WG Conference Call Minutes & Accept Agenda

IHE has released for public comment

  • DS4P US - National extension which is supposed to be alighted with the DS4P HL7 has completed (any deviations should be brought to light and fixed in the next iteration
  • Handbook explaining how to utilize data elements analysis with reisk assessment and the various DeID pseduonomization to come up with a use case algorhythim and how to test if your algorhythim has done its job. it is intened to use to write profiles that write deID. i.e. within quality reporting.

ACTION ITEM: John Moehrke will forward the e-mail to the Security and CBCC listserve.

Restructure Security Topic in HL7 v.3 Normative Edition Kathleen had a discussion with Don Lloyd on possible restructuring the Security WG security topics. HL7 V3 Normative Edition\HL7 2012 left hand pane > Foundations > Security > RBAC The document has not been edited for some time and we have contributers on the RBAC work who are not working on the current project. As a suggestion to the group, to create a new topic, but to have it say Security and Privacy and it would be a place wehre all our artifacts can be located. We have very few which are easily found in the V3 realm. Only one DAM is appearing hear. If we were to be like other groups, i.e. regulated studies (RCIM); each topic has its own landing page. Don's suggestion was for Security to have a table of contents linking to each artifact and a list of the artifacts under the Security and Privacy topic. This also needs to be reviewed by CBCC were appropoirate. For the DAMs, you would also have a link from the list page. Open for discussion. Advantage.

Audit Log should not be configuable27:00 - John M There should be some audit...


MIND MAP Should be palce in gForge either in MindMap format or HTML for WG members to review and update (let Diana/Tony know so they can update); Reviewing defintiions


Paul: Mobile Health