Thread: HIPAA

HIPAA

From
Silvana Di Martino
Date:
It looks like that also USA-resident DBAdmins have to protect their data, at
least when their data are related to someone else's personal health:

http://www.cms.hhs.gov/hipaa/

http://www.hhs.gov/ocr/hipaa/

http://www.hipaa.org/

This seems to give to this "db encryption" issue the status of "global
relevance" that would deserve a more systematic approach. I mean: no
homegrown solutions - rather have the community to develop a specific,
standard extension of PostgreSQL and put it into the distro.

I wonder if it is the case to contact the PostrgreSQL developers and signal
this (new and annoying) issue.

Any comment?
-----------------------------------------
Alessandro Bottoni and Silvana Di Martino
alessandrobottoni@interfree.it
silvanadimartino@tin.it

Re: HIPAA

From
Andrew Sullivan
Date:
On Mon, Mar 08, 2004 at 12:07:23PM +0000, Silvana Di Martino wrote:

> This seems to give to this "db encryption" issue the status of "global
> relevance" that would deserve a more systematic approach. I mean: no
> homegrown solutions - rather have the community to develop a specific,
> standard extension of PostgreSQL and put it into the distro.

Just to throw another wrench into the works, you might want to think
about some of the observations on what data you _really_ need that
are in Peter Wayner's _Translucent Databases_ (Flyzone Press, 2002.
ISBN 0-9675844-1-8).  Many of the techniques are not particularly
novel, but the discussion in the beginning about deciding just which
data you _really_ need is, I think, very helpful.  There's a tendency
to collect data just because one can, and the new data protection
laws are an attempt to find a techno fix to the problem.  (I still
like it that someone is spending some time on improving the crypto
stuff, though.)

A

--
Andrew Sullivan  | ajs@crankycanuck.ca
The fact that technology doesn't work is no bar to success in the marketplace.
        --Philip Greenspun

Re: HIPAA

From
Gorshkov
Date:
On March 8, 2004 09:07, Andrew Sullivan wrote:
> On Mon, Mar 08, 2004 at 12:07:23PM +0000, Silvana Di Martino wrote:
> > This seems to give to this "db encryption" issue the status of "global
> > relevance" that would deserve a more systematic approach. I mean: no
> > homegrown solutions - rather have the community to develop a specific,
> > standard extension of PostgreSQL and put it into the distro.
>
> Just to throw another wrench into the works, you might want to think
> about some of the observations on what data you _really_ need that
> are in Peter Wayner's _Translucent Databases_ (Flyzone Press, 2002.
> ISBN 0-9675844-1-8).  Many of the techniques are not particularly
> novel, but the discussion in the beginning about deciding just which
> data you _really_ need is, I think, very helpful.  There's a tendency
> to collect data just because one can, and the new data protection
> laws are an attempt to find a techno fix to the problem.  (I still
> like it that someone is spending some time on improving the crypto
> stuff, though.)
>
> A

Many, many moons ago when I was young and stupid, I was in an intelligence
trade in the Cdn Navy - COMINT/SIGINT.

it never ceases to amaze me at how consistantly people underestimate the
information that can be taken from a datum - especially when aggrigated with
data from other sources.


Re: HIPAA

From
Andrew Sullivan
Date:
On Mon, Mar 08, 2004 at 05:25:34PM -0500, Gorshkov wrote:
> it never ceases to amaze me at how consistantly people underestimate the
> information that can be taken from a datum - especially when aggrigated with
> data from other sources.

This is actually part of the argument for why you just shouldn't
store or ask for a lot of stuff in the first place.  Of course it's
true that the little bit of data that you have can be aggregated with
the little bit of data someone else has in case a dedicated attacker
is trying to build up a full data set.  But given that there are
these data, nobody is actually going to be able to prevent such an
attacker anyway.  All you can do is limit your own liability in
exposing data; and that means collecting as little (not as much) as
you can, and then further attempting to protect the data you actually
do collect.

A

--
Andrew Sullivan  | ajs@crankycanuck.ca
This work was visionary and imaginative, and goes to show that visionary
and imaginative work need not end up well.
        --Dennis Ritchie

Re: HIPAA

From
Christopher Browne
Date:
Martha Stewart called it a Good Thing when listsubscriptions@oghma.on.ca (Gorshkov) wrote:
> On March 8, 2004 09:07, Andrew Sullivan wrote:
>> On Mon, Mar 08, 2004 at 12:07:23PM +0000, Silvana Di Martino wrote:
>> > This seems to give to this "db encryption" issue the status of
>> > "global relevance" that would deserve a more systematic
>> > approach. I mean: no homegrown solutions - rather have the
>> > community to develop a specific, standard extension of PostgreSQL
>> > and put it into the distro.
>>
>> Just to throw another wrench into the works, you might want to
>> think about some of the observations on what data you _really_ need
>> that are in Peter Wayner's _Translucent Databases_ (Flyzone Press,
>> 2002.  ISBN 0-9675844-1-8).  Many of the techniques are not
>> particularly novel, but the discussion in the beginning about
>> deciding just which data you _really_ need is, I think, very
>> helpful.  There's a tendency to collect data just because one can,
>> and the new data protection laws are an attempt to find a techno
>> fix to the problem.  (I still like it that someone is spending some
>> time on improving the crypto stuff, though.)
>>
>> A
>
> Many, many moons ago when I was young and stupid, I was in an
> intelligence trade in the Cdn Navy - COMINT/SIGINT.
>
> it never ceases to amaze me at how consistantly people underestimate
> the information that can be taken from a datum - especially when
> aggrigated with data from other sources.

I'd like to think you misspelled "aggravated" there :-)

The US situation of SSN numbers being widely used as personal
identifiers has been quite spectacularly disastrous for personal
security.

My credit union finally "saw the light" a couple of years ago, and
decided to use their own randomly generated account IDs; I gather that
many (most?) US companies have been taking the same strategy with
employee and customer account numbers.

For different organizations to use different keys is not a total
panacea, but the lack of uniqueness has been pretty harmful.

Wayner's book is certainly pretty good on the subject; it may not be a
NIST/FIPS/ISO standard, but it certainly presents the security issues
coherently.

What is pretty clear is that this kind of application requires that
there be a use of data encryption that is controlled _outside_ the
database layer.

There may be attempts made to sell the notion that the Right Solution
requires using some particular product, such as Trusted Oracle; you
can expect that to be pressed by vendors that have products they want
to push.  Unfortunately, this may well worsen security, by putting
trust in a layer that cannot provide security.
--
let name="cbbrowne" and tld="cbbrowne.com" in name ^ "@" ^ tld;;
http://cbbrowne.com/info/rdbms.html
"I think we might have been better off with a slide rule."
-- Zaphod Beeblebrox