A Framework for Extracting and Modeling HIPAA Privacy Rules for Healthcare Applications

نویسندگان

  • Tariq Alshugran
  • Julius Dichter
چکیده

Some organizations use software applications to manage their customers’ personal, medical, or financial information. In the United States, those software applications are obligated to preserve users’ privacy and to comply with the United States federal privacy laws and regulations. To formally guarantee compliance with those regulations, it is essential to extract and model the privacy rules from the text of the law using a formal framework. In this work we propose a goal-oriented framework for modeling and extracting the privacy requirements from regulatory text using natural language processing techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Health Insurance Portability and Accountability Act (HIPPA) Compliant Access Control Model for Web Services

Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of rules to be followed by health plans, doctors, hospitals, and other healthcare providers in the U.S. HIPAA privacy rules create national standards to protect individuals’ health information. Recently, there have been increasing demands and discussions about Web services-based healthcare applications. It is, therefor...

متن کامل

HIPAA Privacy/Security Rules: where we've been and where we are going. Updates from the HITECH Act to dramatically impact HIPAA privacy/security.

When HIPAA was passed, many applauded the portability aspects of HIPAA that allowed for continuing healthcare coverage for individuals who lost their jobs and attendant healthcare insurance. But few back in 1996 anticipated the dramatic impact that HIPAA would have later on the privacy and security of health information in the United States. This article discusses not only the history of HIPAA ...

متن کامل

How HIPAA final rules affect health information technology vendors.

I n addition to healthcare reform, healthcare providers and their vendors now have to grapple with recently promulgated federal rules regarding privacy and security of health information. Key to the future of the healthcare reform efforts is health information technology (HIT), a broad term that is often used in conjunction with electronic health records (EHRs), mobile health (mHealth), telemed...

متن کامل

Five steps to protect your organization from HIPAA audits.

An audit begins with a notification letter requesting evidence of a covered entity’s HIPAA privacy and security compliance efforts. Thirty to 90 days following receipt of the requested information, KPMG will conduct an on-site visit. The on-site visit will include interviews with the entity’s leadership, examination of the physical space and operations, review of consistency of the entity’s pra...

متن کامل

Electronic Medical Records, HIPAA, and Patient Privacy

The continued growth of healthcare information systems (HCIS) promises to improve quality of care, lower costs, and streamline the entire healthcare system. But the resulting dependence on electronic medical records (EMRs) has also kindled patient concern about who has access to sensitive medical records. Healthcare organizations are obliged to protect patient records under HIPAA. The purpose o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1603.02964  شماره 

صفحات  -

تاریخ انتشار 2016