Feds move toward health claims database despite privacy fears
But newly revised plans limit scope, add greater transparency
Computerworld - Despite lingering privacy concerns, the U.S. Office of Personnel Management (OPM) is plowing ahead with plans to build a massive centralized database containing detailed healthcare claims information on millions of federal employees and their families.
The agency on Wednesday released two formal notices in the Federal Register detailing plans for the new Health Claims Data Warehouse. One of the notices describes how the OPM will use the database, the other describes how the OPM Inspector General's office will use it.
Work on the database begins July 15.
The notices -- known in government parlance as systems-of-records notices -- are aimed at addressing some of the concerns raised by several privacy groups when the OPM first detailed its plans last October. The outcry prompted the OPM to push back its original deadline.
Wednesday's notice, for instance, substantially limits the scope of the database, narrows the circumstances under which information from it will be used and clarifies that only de-identified data will be released outside of OPM.
The revised plans go a long way in addressing some of the original concerns, said Harley Geiger, policy council at the Center for Democracy and Technology (CDT), which has been vigorously arguing for more privacy controls.
Even so, several other fundamental issues, including database architecture and data anonymity, that remain unaddressed, Geiger said.
According to the OPM, the data warehouse is designed to help the agency better manage federal health claims programs. Under the effort, the agency will collect and analyze health services data from the Federal Employees Health Benefits Program (FEHBP). Members of the FEHBP include federal and postal employees, uniformed service members and retirees.
As part of its plan, OPM will establish a direct data feed with the FEHBP to continuously collect, manage and analyze health services data. The information collected includes individuals' names, addresses, Social Security Numbers and dates of birth, plus the names of their spouses and other information about dependents, as well as information about their healthcare coverage, medical conditions, procedures and diagnoses.
The OPM will use identifiable data to create 'longitudinal' long-term health records for each individual in the database. However, OPM analysts, who access the data for analyses, will only have access to de-identified records.
"OPM will analyze the data in order to evaluate: The cost of care; utilization of services; and quality of care for specific population groups, geographic areas, health plans, health care providers, disease conditions, and other relevant categories," the OPM notices said.
The inspector general's office, meanwhile, will use the claims database for audit and investigative purposes to detect fraud and waste, according to one notice.
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts