•PRIVACY: Solution more research needed, some startups
•Symmetric checking
of access to information systems and also
checking of the subsequent release of their contents
–Act like a
warehouse store
oCheck and/or remove restricted topics in outgoing
documents
a. Researchers: Names,
employers, addresses, emails, . . .
b. Payors: other
incidents, prior diseases, admissions, . . .
c.. . . : check specific contents for each collaborating
& authorized role
oBetter: check that
all terms in outgoing documents are acceptable
§Use a topic-specific
inclusive word/phrase list, and filter others
omost application / usage areas use less than 3000
terms
§Paranoia is safest,
and the cost is bearable
oTrapped documents can be released by a security
officer
oExtract text from
images, as x-rays, and then check those texts
oMany media contain
unexpected private or identifying data