Towards privacy preserving comparative effectiveness research

Similar documents
Power to patients: How telehealth promotes equal partnership in health services

De-identification and Clinical Trials Data: Oh the Possibilities!

The Telemedicine Referral Case Process

Patient Privacy and Clinical Laboratory Data

Sharing health information electronically eliminates the need for faxing, copying and handcarrying your health record from provider to provider.

APPLICATION FOR RESEARCH REQUESTING AN IRB WAIVER OF CONSENT AND HIPAA AUTHORIZATION

A Reality Check on Health Information Privacy: How should we understand re-identification risks under HIPAA?

PFF Patient Registry Protocol Version 1.0 date 21 Jan 2016

Practice Transformation: Patient Centered Medical Home Overview

Artificial Intelligence Changes Evidence Based Medicine A Scalable Health White Paper

U.S. Healthcare Problem

2. What is the main similarity between quality assurance and quality improvement?

APPENDIX 2 NCQA PCMH 2011 AND CMS STAGE 1 MEANINGFUL USE REQUIREMENTS

Understanding and improving the quality of medication use: Research in Clinical Pharmacy starting from Academia. Anne Spinewine

Massachusetts Newborn Screening Public Health Service, Research and. Public Trust

Kaiser Permanente Northern California Large Scale Hypertension Control Program

Center for Health and Technology Telehealth Education Program. Executive Overview

Safe Harbor Vs the Statistical Method

Comparative Effectiveness Research and Patient Centered Outcomes Research in Public Health Settings: Design, Analysis, and Funding Considerations

Structuring the content of large-scale Electronic Patient Records

Welcome to Rochester RHIO s GET DIRECTed! Denise DiNoto Director of Community Services March 2014

The Role of the Agency for Healthcare Research and Quality (AHRQ) in the US Drug Safety System

Checklists for screening for active tuberculosis in high-risk groups

Telehomecare Technologies for the Elderly: Milestones and challenges

Registry Evaluation Form

Component Description Unit Topics 1. Introduction to Healthcare and Public Health in the U.S. 2. The Culture of Healthcare

ehealth to Disseminate Lay Health Coaching

E-HEALTHCARE DELIVERY HOW RETAIL MEDICINE IS

Does The Chronic Care Model Work?

Pay-for-Performance: Approaches of Professional Societies

Electronic Medical Records and Nursing Efficiency. Fatuma Abdullahi, Phuong Doan, Cheryl Edwards, June Kim, and Lori Thompson.

October, 2016 Pediatric Heart Network Policy Manual

Stanford Self-Management Programs Effectiveness and Translation

MEDMARX ADVERSE DRUG EVENT REPORTING

Targeted technology and data management solutions for observational studies

Geisinger IRB Member Orientation Session 2. Debra L. Henninger, MHS RN CCRC Associate Director, Research Compliance

The History of Meaningful Use

YOUR HEALTH INFORMATION EXCHANGE

G-I-N 2016 conference report

The EU GDPR: Implications for U.S. Universities and Academic Medical Centers

PRIVACY IMPACT ASSESSMENT (PIA) For the

Publication Development Guide Patent Risk Assessment & Stratification

Access to Patient Information for Research Purposes: Demystifying the Process!

The Feasibility of Using Electronic Health Records (EHRs) and Other Electronic Health Data for Research on Small Populations

A Study on Personal Health Information De-identification Status for Big Data

Health Information Exchange. Anne Dobbins, RN Operations Director Minnesota Health Information Exchange (MN HIE)

Patient-Centered Connected Care 2015 Recognition Program Overview. All materials 2016, National Committee for Quality Assurance

Use of Information Technology in Physician Practices

SMASH! 1 Introduction

Incident Reporting and Hazard Control. James M. Walker, MD, FACP Chief Health Information Officer

The Future of. Health Informatics. in Hong Kong. Dr N.T. Cheung Chief Medical Informatics Officer Hong Kong Hospital Authority. Tuesday, 16 June 2009

Financial mechanisms for integrating funds across health & social care

Transforming Health Care with Health IT

Challenges and Innovations in Community Health Nursing

Designing Tailored Internet Support to Assist Cancer Patients in Illness Management

INSTITUTIONAL REVIEW BOARD Investigator Guidance Series HIPAA PRIVACY RULE & AUTHORIZATION THE UNIVERSITY OF UTAH. Definitions.

HIPAA COMPLIANCE APPLICATION

WHITE PAPER RE-IMAGINING CARE-AS-A-SERVICE

Meaningful Use Hello Health v7 Guide for Eligible Professionals. Stage 2

Insights as a Service. Balaji R. Krishnapuram Distinguished Engineer, Director of Analytics, IBM Watson Health

Clinical Practice Guideline Development Manual

A wireless arrhythmia detection system, preliminary results from pre-clinical trials

The Value of Interoperable Health Information Technology

Driving the value of health care through integration. Kaiser Permanente All Rights Reserved.

Setting up a CITI account for users not enrolled at or employed by Georgia Tech. Georgia Institute of Technology December 2016

3. Does the institution have a dedicated hospital-wide committee geared towards the improvement of laboratory test stewardship? a. Yes b.

Clostridium difficile Prevention Strategies A Review of Our Experience

Esteban de Manuel (Kronikgune) CareWell Project coordinator 30 September 2016, Bad Hofgastein, Austria

ASCs and Meaningful Use. Patrick Doyle, Vice President Sales Jessica McBrayer, RN, Business Analyst Ron Pelletier, Vice President Market Strategy

Document Details Clinical Audit Policy

Mutah University- Faculty of Medicine

The Impact of The HIPAA Privacy Rule on Research

Navigating HIPAA Regulations. Michelle C. Stickler, DEd Director, Research Subjects Protections

Predicting Transitions in the Nursing Workforce: Professional Transitions from LPN to RN

CROSSING THE CHASM: ENGAGING NURSES IN QUALITY IMPROVEMENT AND EVIDENCE BASED PRACTICE

Health Information Technology and Interdisciplinary Teamwork in the VA

FOMA Mid-Year Seminar 20 October 2017 Michelle R. Mendez,DO Chair, Florida Board of Osteopathic Medicine Fellow, Health Care Policy

Patient and Provider Perspectives of Self-Management of Ulcers in SCI/D

Patient Centered Medical Home 2011

An Information Strategy for the modern NHS and relevance to the health system context of the Russian Federation

Clinical Medical Standing Orders (PCMH 1G) Delegation of Duties (NM Medical & Nurse Practice Acts, FTCA) CLIA Waived Testing (CLIA)

UNDERSTANDING THE CONTENT OUTLINE/CLASSIFICATION SYSTEM

Health Informatics. Mark Carroll University of California, Davis School of Medicine Health Informatics Program

It's time for a change to better utilize resources in healthcare

Compliance Policy C-FMS Clinical Research Project Approval Application

A Standardized Approach to De-Identification

Assessment of Primary Care Resources and Supports for Chronic Disease Self management (PCRS) Quality Levels

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

ONC Cooperative Agreement HIE Program Update. Arizona Rural & Public Health Policy Forum January 19, 2012

Funding Opportunity: Postdoctoral Fellowship Grant Awards

Assessment of e-health technology

A Care Coordination Model for Value-Based Performance Programs

INSPIRing Changes to the IRB Process: New templates and more

The results will also be used for public reporting for MN Community Measurement on mnhealthscores.org.

Behavioral Health Information Network of Arizona

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH

HIPAA Education Program

Crossing the Quality Chasm:

POLICY & PROCEDURE. This policy applies to all healthcare organizations owned and/or managed by WFH.

CROSSWALK: CHANGE CONCEPTS FOR PRACTICE TRANSFORMATION AND 2014 NCQA PCMH TM RECOGNITION STANDARDS

Transcription:

Towards privacy preserving comparative effectiveness research Kassaye Y. Yigzaw Johan Gustav Bellika Anders Andersen Gunnar Hartvigsen HelseIT 2013, Trondheim

Overview Motivation Comparative Barriers Identifiable data Deidentified data Secure multi-party computation Discussion 2

Motivation Demography change (i.e. aging population, multiple chronic conditions) Infectious diseases Health care system is under serious challenges 3

Motivation (2) An increased use of electronic health records (EHRs) Detail and diversity of healthcare and biomedical data is collected Health care systems effectiveness and efficiencies Patient outcomes and safety 4

Knowledge generation and use in medicine Alerts Quality Registries Clinical Decision Support Clinical Trials Order sets Compliance Checking Knowledge Management Computerized Guidelines Source: Rong Chen, MedInfo2013 tutorial on OpenEHR Guideline Definition Language 5

Comparative Effectiveness Research Generate evidence on the effectiveness, benefits, and harms of different treatment options in real life Study designs: systematic reviews of existing studies, RCTs, and observational data analyses Observational studies use existing data sources 6

Comparative Effectiveness Research (2) Lab test result, treatment and outcome, outpatient visits, hospitalization, primary care visits, pharmacy, and/or other information Patients receive care from multiple institutions Strong statistical power Population heterogeneity Horizontally and vertically partitioned dataset Link data distributed across multiple institutions 7

What is the problem? 8

What is the problem? 9

Objective Enjoy the benefits of both the privacy and research worlds! 10

Identifiable Data Use of identifiable data requires individuals consent Except under limited circumstances Difficult to obtain consent from some patients, such as severely ill, demented and pediatric patients Often, it is not practical to collect consent (i.e. large study size) 11

Identifiable Data (2) Consenter Vs. non-consenter difference Demographic and Socio-economic characteristics Biased samples 12

De-identified Data De-identified data can be used for research Health data can be deidentified: Removing identifiers (e.g. Safe harbor and limited dataset) Statistical methods The HIPAA safe harbor method involves removal of 18 identifiers including biometric or genetic data Limited dataset removes 16 identifiers (except date and zip code) and obtain data use agreement 13

De-identified Data (2) De-identification data usefulness re-identification Causal relationship between events Link data from multiple source to individual record Sub-populations level study 14

Secure multi-party computation (SMC) Health institution 1 Trusted Third Party Secure multi-party computation emulate the trusted party Health institution 2 Bogdanov D. Sharemind-Easily programmable secure multi-party computation on integers, strings and floating point numbers. Health institution 3 15

Secure multi-party computation (2) A set of two or more parties with private inputs, x 1,..,x n wish to jointly compute a function, f(x 1,..,x n ), of their inputs Parties wish to preserve some security properties. E.g. privacy and correctness. Even in the face of adversarial behavior by some of the participants, or by an external party. Yehuda Lindell. Presentation Tutorial on Secure Multi-Party Computation. IBM T.J.Watson 16

History Introduced by Yao in 1982 (two-party computation) Goldreich et al. in 1987 (Multi-party computation) No practical implementation until the last decade 17

SMC techniques Generic techniques (i.e. Garbled circuit, Homomorphic encryption, Secret sharing) Specialized techniques (i.e. secure sum, scalar product) 18

SMC protocols All to all communication Representative based approach Considered not efficient and not scalable to hundreds and thousands of distributed data sources 19

Distributed SMC Decompose the computation problem in a way that can be computed by neighbor peers in parallel A peer only jointly compute with neighbors ONLY combined statistics of neighbor peers private data will be learned Reasonable to hide private data in combined statistics of neighbor peers 20

Distributed SMC (2) Constant communication complexity Enable parallel computations Execute asynchronous algorithms Hypothesis: Distributed SMC enables more efficient and scalable solutions. 21

Discussion Data sources maintain autonomy over their record No new information can be discovered after a computation Preserve patients and data owners privacy Increased data owners motivation to participate 22

Reference Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data Middleware 2013 (submitted) 23

Acknowledgement Gro Berntsen, Norwegian Center for Integrated care and Telemedicine, University Hospital North Norway Tromsø Telemedicine Laboratory (TTL) University of Tromsø Norwegian center for integrated care and telemedicine (NST) 24

Contact Information Kassaye Y. Yigzaw PhD student University of Tromsø kassaye.y.yigzaw@uit.no +4796747253 25