architecture principles for data privacy of cloud based
play

Architecture Principles for Data Privacy of Cloud-based Medical - PowerPoint PPT Presentation

Architecture Principles for Data Privacy of Cloud-based Medical Device Services Dr. Andrzej J. Knafel Data Protection Laws Architecture for Selected Technical Controls of Data Privacy Conclusions Data Protection Overview of laws and controls


  1. Architecture Principles for Data Privacy of Cloud-based Medical Device Services Dr. Andrzej J. Knafel

  2. Data Protection Laws Architecture for Selected Technical Controls of Data Privacy Conclusions

  3. Data Protection Overview of laws and controls dependencies Examples: • Opt-in vs. Opt-out • Data Residency in Country vs. Examples: Controlled Data Transfer • Security Certifications • Access for Law Enforcement • Anonymization Examples: • Data Portability • Audit Trail

  4. Data Protection European Union General Data Protection Regulation (GDPR) • In effect starting on 25 May 2018 • Processing of “personal data” in the context of the activities in the EU • Processing data of “data subjects who are in the Union” • GDPR may apply to manufacturer or service provider when: • has legal presence in the EU • offers goods and services to EU residents • monitors the behavior of EU residents, e.g. websites and mobile apps tracking digital activities of visitors • has employees in the EU

  5. Data Protection GDPR in a nutshell Broader Scope Rights of Individuals New Provisions Risk Based Approach • Harmonization : • Right to Access : Data Subjects • Data Transfer to third • Data Protection by Design : Countries : alternate provisions one continent – one law gets broader information accounting for privacy risk by in absence of adequacy; implementing appropriate • Consent : to be unambiguously • Right to Erasure : conditions for Effective Safeguards, Binding technical and organizational given for each specific purpose; and against enforcing Corporate Rules measures throughout the withdrawal any time • Right to Restrict Processing : process of establishing a new • Fines : high fines for non- • Special data categories : rationales and consequences of product or service compliance biometric and genetic enforcement • Data Protection by Default • 18 new definitions • Expanded definition of • Automated Decision Making • Data Protection Impact Personal Data incl. Profiling : Data Subject can • Increased responsibility and Assessment obtain human intervention, accountability of Controllers • Detailed and elaborate and Processors : maintaining • Data Protection Officer explanation and challenge the provisions on Supervisory decisions detailed Records of Processing Authority Activities; obligation to report • Data Portability : Data Subject data breaches without delay to right to receive personal data in Supervisory Authority and Data structured, commonly used and Subject machine readable format or have • Compensation and Liability : them directly transmitted to other Data Controller by Controllers and Processors

  6. Medical Devices and Services for Diagnostics Scope of Data Privacy Data Subjects to be protected • Patients • hospitalized • in ambulatory care • self-managed • Health Enterprise personnel • operators of medical devices • operators of IT systems • Manufacturer’s personnel • operators of IT systems • service & support

  7. Data Protection Laws Architecture for Selected Technical Controls of Data Privacy Conclusions

  8. Architecture Principles for Data Privacy Example of a common challenge … Scenario 1. ACME architected system/service used at clinical lab XYZ and underlying GDPR and GxP regulations is operated by a group of individuals employed by XYZ (remark: regulations, like GxP mandate Audit Trail) ACME System 2. One of the operators leaves XYZ and demands that his/her data will be erased from all systems related to his/her work Pseudonym Challenge Reference – What is the easiest and cost efficient way to offer the compliance with the GDPR article 17? Operator (Erasure of Personal Data) Suggestion Identity – Design the system to use pseudonymized* (tokenized) “operator id” in login, audit trail and other logs (GDPR article 20). XYZ User Directory – Do not capture and store any Personal Data of the operator (name, e-mail, …), but instead refer to the user directory of lab XYZ * pseudonymized - GDPR definition, Article 3(5) ‘pseudonymisation’ means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person;

  9. Architecture Principles for Data Protection Overview of Technical Controls areas Data Classification Data Subject Related Labelling Functionality Tagging Consent Data Residency Management Portability Encryption Storage Redundancy Anonymization Backup-Restore Pseudonymization Data Loss Key Management Prevention User Access Control Data breach Identity Management detection User Residency Audit Trail

  10. Architecture Principles for Data Privacy of Cloud Services Selected examples of Technical Controls Data Classification Data Subject Related Labelling Functionality Tagging Consent Data Residency Management Portability Encryption Storage Redundancy Anonymization Backup-Restore Pseudonymization Data Loss Key Management Prevention User Access Control Data breach Identity Management detection User Residency Audit Trail Red framed principles are addressed here – all others may be available on request.

  11. Architecture Principles for Data Privacy of Cloud Services Example: Anonymization / Pseudonymization [GDPR article 6, 25, 32] 1. Data, which is neither classified as “Public”, nor provided with Anonymization is the preferred solution over consent for the specified purpose, and is intended for use as pseudonymization. the source for data analytics or aggregation, should undergo anonymization utilizing techniques supported by the CSP technology and assessment practices published in “Anonymization techniques 0829/14/EN WP216”. Pseudonymization is not a failsafe approach per the 2. Avoid using Pseudonymization with the records of data protection requirements, because mapping the pseudonyms to the identity in the scope of pseudonymized data can be re-identified to a specific the same solution . natural person through various organizational and technological means. 3. Unstructured data elements may contain identifiable information and it should be treated as Personal Data. Pseudonymization should be preferred over managing the identity of the Data Subject.

  12. Architecture Principles for Data Privacy of Cloud Services Example: Data Classification – Labelling / Tagging [GDPR article 10] Examples 1. Each data item category should be classified and correspondingly Use automatic data classification service. labelled. 2. Multiple labels can be applied to individual data items. 3. Use labels aligned / standardized within your industry or organization. AWS Macie A service that uses machine learning to automatically discover, 4. In objects with a combination of labels of various classes, classify, and protect sensitive data in AWS. Amazon Macie the strictest label shall be applied. recognizes sensitive data such as personally identifiable information or intellectual property. 5. Labels: https://aws.amazon.com/macie/ a. Confidentiality level Google DLP API i. Public DLP API provides fast, scalable classification and redaction for ii. Internal sensitive data elements like credit card numbers, names, social iii. Confidential security numbers, US and selected international identifier numbers, iv. Secret phone numbers and GCP credentials. https://cloud.google.com/dlp/ b. Location containment i. Open worldwide MS Azure DgSecure or SQL Threat Detection ii. Keys Storage in Accepted Region iii. Keys and Data Storage in Accepted Region DgSecure detects, audits, protects, and monitors sensitive data assets and is optimized for HDInsight and other Hadoop Distributions c. Purpose of use including Hortonworks, Cloudera, and MapR. i. Medical Value https://azuremarketplace.microsoft.com/en-us/marketplace/apps/dgsecure.dgsecure ii. Lifestyle Advice https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection iii. …

Recommend


More recommend