This wiki has undergone a migration to Confluence found Here
Difference between revisions of "November 15th, 2011 Security Working Group Conference Call"
Jump to navigation
Jump to search
(→Agenda) |
(→Agenda) |
||
Line 34: | Line 34: | ||
issues about email topics- the right approach to technical standards regarding managing privacy consents in a scalable way… we are working with the Confidentiality Codes—but it seems like we’re circling; what’s feasible and what isn’t. I’d like to go over this territory again. | issues about email topics- the right approach to technical standards regarding managing privacy consents in a scalable way… we are working with the Confidentiality Codes—but it seems like we’re circling; what’s feasible and what isn’t. I’d like to go over this territory again. | ||
#''(5 min)'' '''New and Other Business''' | #''(5 min)'' '''New and Other Business''' | ||
+ | |||
+ | ==DRAFT Meeting Minutes== | ||
+ | '''Roll Call, Approve Minutes & Accept Agenda''' **This meeting discussion will continue into CBCC hour** | ||
+ | |||
+ | '''PASS Discussion''' - Security Input for new projects for PASS | ||
+ | |||
+ | |||
+ | '''HL7 Confidentiality Code Refactoring Project''' - Kathleen Connor | ||
+ | * '''3 types of Policy Data Binding''' discussion added (e-mail string between Mike Davis, Kathleen Connor, John Moehrke, Richard Thoreson, Tom Bonina) | ||
+ | |||
+ | '''Revisit - International Member participation''' - Doodle Poll; Discussion pushed to next week's agenda | ||
+ | |||
+ | |||
+ | '''HL7 Composite Security and Privacy Domain Analysis Model (DAM)''' - reconcilliation update | ||
+ | * FHIMS coordination | ||
+ | |||
+ | '''Caveat codes''' | ||
+ | |||
+ | '''New and Other Business''' | ||
+ | |||
+ | |||
+ | ==Action Items== | ||
+ | |||
+ | [[Security|Back to Security Main Page]] | ||
==Action Items== | ==Action Items== | ||
[[Security|Back to Security Main Page]] | [[Security|Back to Security Main Page]] |
Latest revision as of 09:36, 15 November 2011
Contents
Security Working Group Meeting
Attendees
- Kathleen Connor
- Ed Coyne
- Mike Davis Security Co-chair
- Jon Farmer
- Suzanne Gonzales-Webb CBCC Co-chair
- Jim Kretz
- Glen Marshall
- John Moehrke Security Co-chair
- Milan Petkovic
- Ken Salyards
- Richard Thoreson CBCC Co-chair
- Tony Weida
- Craig Winter
Agenda
- (05 min) Roll Call, Approve Minutes & Accept Agenda **This meeting discussion will continue into CBCC hour**
- (15 min) PASS Discussion - Security Input for new projects for PASS
- (15 min) HL7 Confidentiality Code Refactoring Project - Kathleen Connor
- 3 types of Policy Data Binding discussion added (e-mail string between Mike Davis, Kathleen Connor, John Moehrke, Richard Thoreson, Tom Bonina)
- (xx min) Revisit - International Member participation - Doodle Poll
- (15 min) HL7 Composite Security and Privacy Domain Analysis Model (DAM) - reconcilliation update
- (15 min) Caveat codes
issues about email topics- the right approach to technical standards regarding managing privacy consents in a scalable way… we are working with the Confidentiality Codes—but it seems like we’re circling; what’s feasible and what isn’t. I’d like to go over this territory again.
- (5 min) New and Other Business
DRAFT Meeting Minutes
Roll Call, Approve Minutes & Accept Agenda **This meeting discussion will continue into CBCC hour**
PASS Discussion - Security Input for new projects for PASS
HL7 Confidentiality Code Refactoring Project - Kathleen Connor
- 3 types of Policy Data Binding discussion added (e-mail string between Mike Davis, Kathleen Connor, John Moehrke, Richard Thoreson, Tom Bonina)
Revisit - International Member participation - Doodle Poll; Discussion pushed to next week's agenda
HL7 Composite Security and Privacy Domain Analysis Model (DAM) - reconcilliation update
- FHIMS coordination
Caveat codes
New and Other Business