2/18/2004
Gio AAAS 04
5
4. Collaborators are allowed in,
    but what they take out must be controlled.
•PRIVACY: Solution           more research needed, some startups
•Symmetric checking of access to information systems and also checking of the subsequent release of their contents
–Act like a warehouse store
oCheck and/or remove restricted topics in outgoing documents
a. Researchers:  Names, employers, addresses, emails, . . .
b. Payors: other incidents, prior diseases, admissions, . . .
c.. . . :  check specific contents for each collaborating & authorized role
oBetter: check that all terms in outgoing documents are acceptable
§Use a topic-specific inclusive word/phrase list, and filter others
omost application / usage areas use less than 3000 terms
§Paranoia is safest, and the cost is bearable
oTrapped documents can be released by a security officer
oExtract text from images, as x-rays, and then check those texts
oMany media contain unexpected private or identifying data
Release filter