- Login and Authentication
- Technical Safeguards
- Personal Health Information (PHI)
- Breach Policy
- Risk Analysis and Management
- Advanced Features
The LAMP Platform is free and open source software currently developed by Beth Israel Deaconess Medical Center but does not have any licensing restrictions for intellectual property. LAMP is safe, secure, and easy to use. Though it has broad potential, we will be using it as an interface that patients and clinicians can use together to track data and generate visual reports. It’s important to note that LAMP is not an electronic health record system. Below is an outline of the technical specifications that back privacy and security in the LAMP Platform.
Login and Authentication
Credentials are required to access the LAMP Platform. By default, a clinician can see the data of their patient, but any other access must be explicitly granted. The clinicians are able to view aggregate reports that contain no identifying information about the patients in the site.
As data is transferred between the device and server, it is encrypted in flight using the TLS v1.3 protocol atop the HTTP/2.0 transmission format. As data is accepted by the server, it is stored in the data lake encrypted at rest using AES-256 encryption through a secret key unique to each site. Any requests made to the server to create, update, delete, or even read data, will cause the incremental addition of the request to an audit log, along with the credentials used to make the request so it is possible for a site to monitor all requests for data.
Personal Health Information (PHI)
There are 18 identifiers that make health information PHI. The one PHI type that LAMP will collect are dates as information is timestamped. LAMP will not collect patient names and uses codes instead. Thus, linking any information collected by LAMP to a unique patient is not easy without a key which will be kept by each site and not shared.
LAMP offers physical and technical safeguards that are in line with the HIPAA Security Privacy Rule. Specifically, the rule “requires covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI including:
- Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit;
- Identify and protect against reasonably anticipated threats to the security or integrity of the information;
- Protect against reasonably anticipated, impermissible uses or disclosures; and
- Ensure compliance by their workforce.
LAMP meets this through the offering the follow features:
- Limited facility access and control with authorized access procedures in place
- Restrictions for transferring, removing, disposing, and re-using PHI
- Access control allowing only for authorized personnel to access PHI.
- Audit reports / tracking logs that record activity
- Integrity controls in the database that ensure data is not altered or destroyed unless by an authorized user with the appropriate permissions
- Encrypted network transmissions
In the event of a suspected data breach, a site lead may immediately revoke all credentials and immediately disable access to the data. As both a public and private key are required to decrypt exported data, and separate private keys are maintained per site and per patient, a data breach of one sub-section of the data cannot and will not affect other sub-sections or the entire platform Furthermore, devices are identified by a unique per-device token and data integrity in flight can be ensured when reviewing the audit trail by cross-referencing this device-specific token. As noted above, LAMP does not record name but identifies users by codes so even with a breach, it will be hard to connect a person to their data.
Risk Analysis and Management
Our team performs frequent risk analysis as part of our security management processes.
The LAMP Platform always collects data in a secure way before automatically processing and harmonizing it for you. Researchers, clinicians, patients, and participants can view their data in the dashboard section of the app. Patients will always retain ownership when contributing their data to your study or clinic and may always download and view their own data. Cognitive tests and survey instruments collect high quality metadata that can measure attention, focus, memory performance, and more. Creating virtual sensors using LAMP’s Sensor Fusion system allows you to avoid dealing with raw data streams and instead understand symptomatology.
Use Tags to attach third-party or legacy data to the processing pipeline, from EMRs or Fitbit bands, for example. The LAMP Platform allows you to design a clinical decision support framework using Automations that can send clinicians an alert when the patient may need assistance with their health. Automated intelligent intervention support works whether patients are connected to the internet or not, on any type of mobile device. Automation applets can also produce detailed visualizations that are automatically integrated into the dashboard in the app, enabling clinicians and patients to intuitively view active and passive data side by side to take action clinically.
The LAMP Protocol, upon which the LAMP Platform is built, may also be integrated into other systems as it is intuitive, simple, and has security and privacy built-in. It models active and passive data together as evolving streams of events, and data becomes reactive and clinically actionable through technologies such as Automations, visualizations, Clinical Decision Support, and Sensor Fusion. Through applets, the Platform brings language-agnostic functional serverless computing to digital medicine. Credential management (HOTP, TOTP, and 2FA coming soon) is built into the object hierarchy, which uses OpenAPI and JSONSchema to markup extensible interfaces. The industry encryption standards AES-256 and TLSv1.3 facilitate secure storage and transmission of data in a HIPAA, COPPA, and GDPR-compliant manner.