• Title/Summary/Keyword: protected health information

Search Result 44, Processing Time 0.02 seconds

The Protecton of Privacy on Secondary Use of Personal Health Imformation (의료기관 개인건강정보의 이차적 이용)

  • Kim, Jang-Han
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF

Examination and Suggestions on Introducing and Administering Confidential Information Review on Material Safety Data Sheets (국내 물질안전보건자료 영업비밀 심사제도의 도입·운영에 대한 검토 및 제안)

  • Lee, Kwon Seob;Jo, Ji hoon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.28 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • Objectives: From a policy perspective, the introduction of confidential information reviews is a vital task for expanding workers' right to know and improving hazardous materials information communication. In this study, rational methods for introducing and administering confidential information reviews were examined as a part of advancing chemical information communication. Methods: The domestic status, social demands, and control cases from other countries about confidential information in material safety data sheets(MSDSs) were all examined. Additionally, principles for introducing MSDS confidential information review, what needs to be revised prior to its introduction, and procedures and manners of reviewing confidential information were suggested. Results and Conclusions: When composition information on MSDS needs to be protected in the EU and Canada, confidential information should be claimed and then approved by competent authorities with a principle of reviewing confidential information prior to rescinding information from MSDS. Applying the same principle, certain information on an MSDS that needs to be protected should be reviewed and approved in Korea. As a result, the MSDS is communicated with approval numbers replacing composition information. MSDS confidential information review has five steps, including deciding whether chemicals claimed to be confidential are excluded from applying for a confidentiality exemption, the names and concentration ranges of ingredients are adequate, and the claimed information is valid in terms of confidentiality.

Study on HIPAA PHI application method to protect personal medical information in OMOP CDM construction (OMOP CDM 구축 시 개인의료정보 보호를 위한 HIPAA PHI 적용 방법 연구)

  • Kim, Hak-Ki;Jung, Eun-Young;Park, Dong-Kyun
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.66-76
    • /
    • 2017
  • In this study, we investigated how to protect personal healthcare information when constructing OMOP (Observational Medical Outcomes Partnership) CDM (Common Data Model). There are two proposed methods; to restrict data corresponding to HIPAA (Health Insurance Portability and Accountability Act) PHI (Protected Health Information) to be extracted to CDM or to disable identification of it. While processing sensitive information is restricted by Korean Personal Information Protection Act and medical law, there is no clear regulation about what is regarded as sensitive information. Therefore, it was difficult to select the sensitive information for protecting personal healthcare information. In order to solve this problem, we defined HIPAA PHI as restriction criterion of Article 23 of the Personal Information Protection Act and maps data corresponding to CDM data. Through this study, we expected that it will contribute to the spread of CDM construction in Korea as providing solutions to the problem of protection of personal healthcare information generated during CDM construction.

Study on National Protected Health Information for Secondary Use and De-identification (의료정보의 2차 이용을 위한 국내 비식별화 대상 정보에 관한 연구)

  • Kim, Cheoljung;Yeo, Kwangsoo;Lee, Pilwoo;In, Hanjin;Moon, Byeongjoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.15-23
    • /
    • 2016
  • Recently the interest in secondary use of medical information has emerged. But the domestic legislation or guidelines, such as being able to say that already specialize in healthcare information, can be seen a 'national medical privacy guidelines'. However the guidelines have suggested that only a violation of privacy laws in the medical information, it does not defined clearly with respect to protected health information(PHI) for secondary use. In this paper, we learn the HIPAA(Health Insurance Portability and Accountability Act) Privacy Rule of the US legislation which provides a non-identifiable screen instructions for secondary utilization of medical information, domestic guidelines and other country's guidelines. comparing with the HIPAA, national medical privacy guidelines and the domestic studies, we propose a new domestic target non-identifying information suitable for the domestic field and present future research direction.

The Health Analysis of Protected Tree 'Zelkova serrata' Using an Ultrasonic Tomograph (느티나무 보호수의 내부 단층 진단을 통한 건강 분석)

  • Kang, Banghun;Cho, Seung-Jin;Son, Jinkwan;Kim, Nam-Choon;Kim, Mi-Heui
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.17 no.2
    • /
    • pp.73-83
    • /
    • 2014
  • This study was conducted to evaluate defects in Zelkova serrata trees using an ultrasonic tomograph (PICUS) and suggest a management plan to maintain it as a natural and cultural resource. In previous study, health information of 16 protected trees were obtained by surveying the following categories; tree appearance, crown, bark, root exposure, water and nutrition, deterioration, pest, vitality, ground status, and pollutant. The average score of health was 16.5 in 16 trees, which means that general monitor is needed for management. In this study, the evaluation result of tree's inside defects using an ultrasonic tomograph showed that 43.8% of decay rate has been found in 16 trees. In fact, some trees look to be good even though they actually have a defects causing broken by natural disaster such as strong wind. Therefore, it is urgent to put some support to the trees and come up with a protective plan. The results of this study would be useful as basic data in developing a guideline for the efficient conservation and management of big and old trees.

A Study on Perception and Practice of Protecting the Patient Medical Information in Some General Hospital Employees (일 지역 종합병원 종사자들의 환자 의료정보 보호에 관한 인식도와 실천도)

  • Jung, Eun-Young;Jung, Sang-Jin
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.4
    • /
    • pp.35-45
    • /
    • 2014
  • This study aimed to identify the relationship between the awareness of employees in medical institutes on the protection of medical information and their practice, and basic data of the development of a protection policy is presented. The subjects of the study were 433 employees of general hospitals located in G city and they were interviewed to ascertain their awareness of the protection of medical information and their practice level. The collected data was analysed with a t-test, a dispersion analysis, a Pearson analysis, and a multi-regression analysis. The mean scores on the awareness of protection of medical information was $4.0{\pm}0.7$, and that for the proficiency level was $3.7{\pm}0.7$. As a relevant factor for awareness and proficiency, education in medical information protection was significantly related to awareness. Education experience in medical information protection and the daily mean number of patients in hospitals had a significant relationship with scores on awareness.

Management Effectiveness Evaluation (MEE) Indicators Development in Protected Forest Areas (산림보호지역의 관리효과성 평가지표 개발 연구)

  • Ryu, Kwangsu;Choi, Jaeyong;Lee, Gwangyu
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.14 no.1
    • /
    • pp.105-119
    • /
    • 2011
  • In order to develop the indicators which evaluate the management effectiveness for the protected forest areas in Korea, candidate indicators were listed based on literature and experts interviews, then questionnaire survey on the experts were conducted. 5 elements of context, planning, input, process, output and outcome and 32 indicators were selected. Context element includes 6 indicators of 1) documentation and assessment of values; 2) documentation and assessment of threats, 3) influence of government policy, 4) related regulations, 5) community cooperation and 6) the structure of management organization. 6 indicators of Planning element were 1) the management objective, 2) protected area design, 3) protected area size and number, 4) representation, 5) standards and categories and 6) management planning. Input element of 3 indicators were 1) management staff, 2) funding, 3) establishment and application of information. Process element were consisted of 1) governance, 2) management guidelines, 3) human resource management, 4) law enforcement, 5) eco-management, 6) disaster management, 7) education program and 8) research and monitoring. The element of outputs and outcomes were 1) accomplishment of plan, 2) accomplishment of program, 3) private land management, 4) threats change, 5) biodiversity change, 6) ecosystem health and vitality, 7) impact on community, 8) international management level and 9) visitors' satisfaction and variation in civil compliant. It is recommended to have further research on evaluation methods development by applying those above developed indicators for the protected forest areas to ensure the practicality of the indicators.

Relationship between Soil Management Methods and Soil Chemical Properties in Protected Cultivation

  • Kang, Yun-Im;Lee, In-Bog;Par), Jin-Myeon;Kang, Yong-Gu;Kim, Seung-Heui;Ko, Hyeon-Seok;Kwon, Joon-Kook
    • Korean Journal of Environmental Agriculture
    • /
    • v.28 no.4
    • /
    • pp.333-339
    • /
    • 2009
  • Various cultural practices have been promoted as management options for enhancing soil quality and health. The use of soil management methods can cause changes in fertility by affecting soil chemical properties. This study aimed to evaluate interactions between soil chemical properties and soil management methods in protected cultivation, and to classify soil management methods that similarly affect soil chemical properties. Water-logging and irrigation reduced soil pH and available $P_2O_5$ content. Application of animal manures has a positive effect on levels of organic matter, Av.$P_2O_5$, K, Zn, and Cu. The electrical conductivites tened to be low in the application of organic amendments, including rice and wood residues. Deeper plowing caused a reduction in Ca content. Practicing soil nutrient-considering fertilization and fertigation did not exert an influence on nutrient element contents. In a cluster analysis of the soil management methods according to major nutrients, low similarities were found with deeper plowing and crop rotation with rice in comparison with other practices. In a cluster analysis by minor nutrient characteristics, crop rotation and application of animal manures and rice residues were linked at a high Ward's distance, while other practices were found to be relatively low distinct. Each soil management method has a similar or different effect on soil chemical properties. These results suggest the necessity of establishing limits and standards according to the effects of soil management methods on soil chemical properties for economic soil practices.

A Study on the Possible New Fusion between Mobile and Healthcare Service (모바일과 의료서비스 간의 새로운 융합 가능성에 관한 연구)

  • Shin, Yong Jae;Kim, Jin Hwa;Lee, Jea Beom
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.27-39
    • /
    • 2012
  • As many applications are possible now in mobile environment with the trend of mobile convergence, diverse applications in healthcare industry are also possible in mobile devices. Though lots of researches on mobile and health services are introduced, they are limited to specific area or techniques. This study shows possible directions of fusion between mobile technologies and health services in the future using a data mining technique called association rule analysis. The data used in this study is collected from web pages containing key words related to mobile technologies and health services. The analysis shows that current cases of fusion between monitoring based telemedicine and patients. It also shows another case of fusion between mobile hospital and medical screen charts. These show that fusion between mobile technologies and health services already began in industry. Association rules are found between well-being, city, diet, and sleep. The association rules containing security and privacy, though their associations are not so strong, also show that security and privacy of patient information should be protected in the future. The results show that the fusion of mobile technologies and health services is expected to provide health services to more users and larger areas. It is also expected to create new diverse business models in the future.

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.