Pages containing 'security'
For the past several weeks, we have been exploring the requirements for meaningful use that allow users to view, download and transmit their records. Most of what we have talked about has been the technical aspects of ensuring that records are sent to the right people. This is a thorny issue, which always comes down to requiring some specific type of application or service be universally available.
Link for Health IT Policy Committee Calendar: http://www.healthit.gov/policy-researchers-implementers/federal-advisory-committees-facas/calendar/2012-11?tid=125
Guest Speaker: Eve Maler, an analyst, strategist, and innovator around digital identity, security, and privacy, with particular interests in creating successful wide-scale ecosystems and fostering individual empowerment. She serves as a Principal Analyst at Forrester Research, serving security and risk professionals.
I was reading the OSEHRA technical journal article on Anonymizer Functions at http://code.osehra.org/journal/browse/publication/10 but it seems that the comment stream and user login are different than the rest of the OSEHRA web site. In order to maintain a common discussion area, I'm posting these comments here.
The paper describes a way of using the Secure Hash Algorithm (SHA- 256) for anonymizing individual fields, such as names, cities, zip codes, etc:
As part of its community development and education mission, OSEHRA hosted the Open Source Software, Military Health Systems Workshop last week at our Headquarters, in the Virginia Tech Research Center located at 900 North Glebe Road, Arlington, Virginia.
It was a productive exchange between academia, industry and government on best practices in open source software development. governance and business models. Please see below a summary of the agenda, or click the attachment below to examine the complete workshop brochure: