Methods and systems for analyzing accessing of medical data

ABSTRACT

Various aspects described herein relate to presenting electronic patient data accessing information. Data related to a plurality of access events, by one or more employees, of electronic patient data can be received. A set of access events of the plurality of access events can be determined as constituting, by the one or more employees, possible breach of the electronic patient data. An alert related to the set of access events can be provided based on determining that the set of access events constitute possible breach of the electronic patient data.

CLAIM OF PRIORITY UNDER 35 U.S.C. § 119

The present application for patent claims priority to Provisional Application No. 62/139,494 entitled “METHODS AND SYSTEMS FOR ANALYZING ACCESSING OF MEDICAL RECORD DATA” filed Mar. 27, 2015, which is assigned to the assignee hereof and hereby expressly incorporated by reference herein in its entirety for all purposes.

BACKGROUND

With the advent of electronic medical records, a patient's medical record can be accessible by various employees operating in a healthcare provider network. The nature of medical workflows is such that traditional role- or attribute-based access control for the medical records may not be feasible as the complexity of clinical care may result in various parties needing to access a patient's medical record, and indeed, rigid access controls may prevent access in emergency situations. Accordingly, however, a given patient's medical record may be subject to breach, or inappropriate accessing, by various parties. A multitude of scenarios for breach can be envisioned where an employee may access a medical record of someone with whom they have a personal interest (e.g., a celebrity, family member, co-worker, etc.) who may be under the care of the healthcare provider network, where the access is unrelated to the employee actually providing services to that person in the healthcare industry. Not only is inappropriate accessing generally not desirable, but it can also result in fines to the healthcare provider network. Accordingly, it is in the healthcare provider network's interest to prevent inappropriate accessing of electronic medical records. Moreover, patients who feel their medical records are being compromised are much less likely to divulge truthful medical information to the healthcare provider network, and thus patient care may be impacted in this regard.

Auditing systems have been developed for tracking employee access of medical records, but these systems do not provide certain desirable analyses of the accessing.

SUMMARY

The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.

In accordance with an aspect described herein a method for presenting electronic patient data accessing information is provided. The method includes receiving data related to a plurality of access events, by one or more employees, of electronic patient data, determining a set of access events in the plurality of access events constitute, by the one or more employees, possible breach of the electronic patient data, and providing an alert related to the set of access events based on determining that the set of access events constitute possible breach of the electronic patient data.

In another aspect, an apparatus for presenting electronic patient data accessing information. The apparatus includes at least one processor configured to perform various operations. The at least one processor can be configured to receive data related to a plurality of access events, by one or more employees, of electronic patient data, determine a set of access events of the plurality of access events constitute, by the one or more employees, possible breach of the electronic patient data, and provide an alert related to the set of access events based on determining that the set of access events constitute possible breach of the electronic patient data. The apparatus also includes a memory coupled to the at least one processor.

In yet another aspect, a non-transitory computer-readable medium storing computer executable code for presenting electronic patient data accessing information is provided. The code includes code for receiving data related to a plurality of access events, by one or more employees, of electronic patient data, determining a set of access events of the plurality of access events constitute, by the one or more employees, possible breach of the electronic patient data, and providing an alert related to the set of access events based on determining that the set of access events constitute possible breach of the electronic patient data.

To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed, and this description is intended to include all such aspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosed aspects will hereinafter be described in conjunction with the appended drawings, provided to illustrate and not to limit the disclosed aspects, wherein like designations denote like elements.

FIG. 1 illustrates an example system for presenting electronic patient data access data in accordance with aspects described herein.

FIG. 2 illustrates an example method for presenting electronic patient data access data in accordance with aspects described herein.

FIG. 3 illustrates an example method for presenting electronic patient data access data in accordance with aspects described herein.

FIGS. 4-7 illustrate example graphical user interface (GUI) screens in accordance with aspects described herein.

FIG. 8 illustrates example rules, tags, or meta data in accordance with aspects described herein.

FIG. 9 is an example system architecture in accordance with aspects described herein.

FIG. 10 is an example system diagram of various hardware components and other features, for use in accordance with aspects described herein.

FIG. 11 is a block diagram of various example system components, for use in accordance with aspects described herein.

DETAILED DESCRIPTION

Aspects described herein generally relate to collecting data from one or more entities in a healthcare provider network, and analyzing the data to determine possible inappropriate accessing of the data. For example, determining the possible inappropriate accessing (also referred to herein as “breach”) of the data can be a manual or automated process based on other analysis of the data. For example, the collected data can include electronic patient data (e.g., from an electronic medical record (EMR)) and data related to accessing the electronic patient data (e.g., an identifier of an employee accessing the EMR data, a time of accessing the EMR data, etc.). The data may also include human resources (HR) data that can indicate information related to the employees accessing the electronic patient data. The collected data can be analyzed, as described herein, to detect whether one or more accesses of the data may possibly be a breach of the data. If possible breach is detected, one or more alerts can be generated (e.g., to one or more interfaces) for further investigation as to whether the access is inappropriate given additional context around the access. In another example, a representation of the collected data can be generated based on the analysis and provided to an interface to facilitate breach detection. Moreover, though EMR data is generally referred to herein, the concepts described can be applied to substantially any electronically stored patient data.

In one specific example, data received from the various sources can be analyzed based on rule-based analysis. In additional examples, the data can be analyzed based on one or more of clusterings of data (e.g., based on one or more determined relationships), machine-learning related to the data, network or other statistics analysis (e.g., Markov chains), etc. In this regard, in an example, one or more ontologies relating to the data can be generated to correlate the data such to enrich events being tracked with clinical context. For example, accesses of similar electronic patient data by different employees can be observed over time (e.g., based on statistical analysis) such to associate the different employees as part of a clinical care team. In this regard, in one example, access of a related EMR by an employee outside of the clinical care team may indicate a possible breach in accessing the EMR. Similarly, access of an EMR by an employee on the clinical care team without similar accessing by other members of the clinical care team may indicate possible breach in accessing the EMR. These example analyses combine and either add to or detract, with unequal weights, from the suspicious nature of event, and increase or decrease the probability that such events are a breach. In any case, when parameters from the data related to an access event achieve a threshold for possible breach, an alert can be generated for providing to an interface for managing compliance for further investigation. In addition, in an example, feedback regarding alerts can be received and utilized in determining thresholds for subsequent alerts such to allow for more or less conservative breach detection.

It is to be appreciated that each healthcare provider network and/or a related entity (e.g., hospital, doctor's office, etc.) may have a different workflow, and thus the analysis of the data in this regard facilitates providing customized breach detection for a given workflow. In a specific example, a hospital may employ a nurse anesthetist in the Operating Room who records the initiation of surgery, while another hospital might employ anesthesiologists who records the initiation of anesthesia. Additionally, in another specific example, some physicians may use phone or email to follow up with patients after an appointment and thus access patient data between appointments where other physicians might only access patient data while the patient is in clinic. Moreover, in another specific example, some clinics may use nurses in an administrative role (such as office assistant) whereas other clinics might use nurses in a research capacity similar to an academic physician, etc. In any case, analyzing the data using clustering, machine-learning, network or other statistical analysis, etc. allows for breach detection for a given workflow than more rigid strictly rule-based systems.

Various aspects are now described with reference to the drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects. It may be evident, however, that such aspect(s) may be practiced without these specific details.

As used herein, the term “determining” or “evaluating” encompasses a wide variety of actions. For example, “determining” and “evaluating” may include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or other data repository, or another data structure), ascertaining, and/or the like. Also, “determining,” and “evaluating” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a data repository), and/or the like. Also, “determining” may include resolving, selecting, choosing, establishing, and the like.

As used herein, the terms “element,” “module,” “component,” and “system” may refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a module may be, but is not limited to being, a machine-executable process running on a processor, a processor, an object, a thread of execution, a machine-executable program, and/or a computer. By way of illustration, both a process running on a server and the server may be a module or a component. One or more modules or components may reside within a process and/or thread of execution. In some implementations, a module may be localized on one computer and/or distributed among two or more computers.

It will be appreciated that, in accordance with one or more aspects described herein, inferences may be made regarding determining protocols to provide to the application, analyzing data for performance of the protocols, and/or the like, as described. As used herein, the term to “infer” or “inference” refers generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference may be employed to identify a specific context or action, or may generate a probability distribution over states, for example. The inference may be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference may also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.

Various aspects or features will be presented herein in terms of systems that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules, etc., discussed in connection with the figures. A combination of these approaches may also be used.

Referring to FIGS. 1-3, aspects are depicted with reference to one or more components and one or more methods that may perform the actions or functions described herein. Although the operations described below in FIGS. 2-3 are presented in a particular order and/or as being performed by an example component, it should be understood that the ordering of the actions and the components performing the actions may be varied, depending on the implementation. Moreover, it should be understood that the following actions or functions may be performed by a specially-programmed processor, a processor executing specially-programmed software or computer-readable media, or by any other combination of a hardware component and/or a software component capable of performing the described actions or functions.

Referring to FIG. 1, an example system 100 is illustrated that facilitates processing EMR access data to determine one or more possible breaches of EMR data. System 100 includes a healthcare provider network platform 102 for storing and facilitating viewing, modifying, etc. EMRs relating to one or more patients currently or previously in (or scheduled for) care of a healthcare provider network (e.g., hospital, doctor's office, imaging center, laboratory, etc.) related to the healthcare provider network platform 102. Healthcare provider network platform 102 can communicate over a network 104 (e.g., a local area network (LAN), Internet, etc.) with one or more other nodes, such as device 106, to allow accessing of the healthcare provider network platform 102 to view one or more EMRs, analyze accessing of EMRs, etc.

Healthcare provider network platform 102 includes EMR data 120 (and/or more generally electronic patient data), which may include a plurality of EMRs and/or other data related to a plurality of patients. The EMR data 120 can indicate demographic information regarding a patient (e.g., name, address, phone number, gender, date of birth, etc.) as well as medical history information regarding the patient (e.g., symptoms, diagnoses, allergies, conditions, etc.). The medical history information can relate to current or previous (or scheduled) care with the healthcare provider network. EMRs can be stored electronically such to facilitate electronic access thereto for viewing, modifying, etc. the information related to a given patient. This can improve convenience of accessing the information, but can also present security concerns related to accessing the information. For example, as described, restricting access to EMRs for certain employees of the healthcare provider network can be impractical in a clinical care setting especially in emergency situations. Thus, various employees of the healthcare provider network may have unrestricted access to EMRs (or at least access that errs on the side of more information to account for situations where more data may be needed to provide adequate healthcare). This can lend to inappropriate accessing of EMRs such to determine protected information regarding certain patients. For example, an employee may seek medical history information for a celebrity, family member, or other person of interest though the access of information may be unrelated to care of the patient by the employee. Accordingly, healthcare provider network platform 102 can facilitate detection of various possible inappropriate data accesses (e.g., breaches) of the EMR data 120.

Healthcare provider network platform 102 can also include EMR access data 122, which may include one or more access logs that indicate time, type, employee, etc. related to accessing EMR data 120, and human resources (HR) data 124 for the employees of the healthcare provider network that indicate personal information for the employees, such as name, address, phone number, position, department, etc. In an example, the employees of the healthcare provider network may also include contract employees (e.g., insurance billers), research employees, etc., that may not necessarily be directly connected to care of a patient. The EMR data 120, EMR access data 122, and/or HR data 124 may be analyzed together to determine possible breaches in accessing the EMR data 120. Moreover, though shown as part of the healthcare provider network platform 102, it is to be appreciated that a portion or all of EMR data 120, EMR access data 122, and/or HR data 124 can exist in one or more other platforms or systems, and may be imported to or otherwise accessed by healthcare provider network platform 102 for analyzing EMR accesses.

Healthcare provider network platform 102 can also include a data receiving component 126 for receiving at least one of the EMR data 120, EMR access data 122, and/or HR data 124, a data analyzing component 128 for analyzing the received data to detect one or more possible breaches of the EMR data 120, and a data presenting component 130 for presenting the analyzed data, the one or more possible breaches, etc. Healthcare provider network platform 102 may also optionally include a feedback component 132 for receiving feedback regarding a detected possible breach for use by data analyzing component 128 in detecting one or more subsequent possible breaches of the data. Data analyzing component 128 may optionally include a rule applying component 134 for applying one or more rules to detect a possible breach in the data, and/or a data patterning component 136 for detecting one or more patterns in the data, which may be used to determine one or more possible breaches in the data. The various components of the healthcare provider network platform may be co-located within a system or network, and/or may be distributed among various systems and/or networks that can communicate with one another (e.g., via network 104 or other networks).

FIG. 2 illustrates an example method 200 for processing electronic patient data access data to determine possible breaches in accessing EMRs. Method 200 includes, at Block 202, receiving data related to a plurality of access events of electronic patient data by one or more employees. Data receiving component 126 can receive data related to the plurality of access events of electronic patient data by one or more employees. This can optionally include, at Block 204, receiving data from EMR access logs, EMRs, and human resources data. Thus, for example, data receiving component 126 can receive data from EMR access logs (e.g., EMR access data 122), EMRs (e.g., EMR data 120), and human resources data (e.g., HR data 124). As described, data receiving component 126 may receive this data from one or more data sources in a healthcare provider network and/or other system or network, which may be distributed across one or more networks, co-located, etc.

Method 200 also includes, at Block 206, determining at least one access event of the plurality of access events by the one or more employees that constitute possible breach of the electronic patient data. Data analyzing component 128 can determine the plurality of access events by the one or more employees that constitute possible breach of the electronic patient data. For example, this can optionally include, at Block 208, detecting the at least one access event based on one or more rules. Data analyzing component 128 may include rule applying component 134 for detecting the at least one access event based on the one or more rules. In one example, rule applying component 134 can apply one or more rules to the data using a rules-based mechanism to determine the at least one access event constituting the possible breach. For instance, the one or more rules may relate to detecting common data among EMR access data 122 and HR data 124. In a specific example, rules applying component 134 may apply one or more rules to the EMR access data 122 relating to determining whether an employee accessing an EMR has similar personal information as a patient to which the EMR corresponds based on additionally acquiring EMR data 120 and HR data 124 (e.g., similar last names, addresses, phone numbers, etc.). In one example, rule applying component 134 may additionally apply filtering rules in this example, to prevent excessive false positives (e.g., for common last names). In any case, in this example, data analyzing component 128 may determine a possible breach in the electronic patient data, which may be presented to an interface as described herein for further investigation.

In another example, the one or more rules may relate to determining whether data relating to a position of the employee from HR data 124 (e.g., or inferred through other data, such as determining a synthetic department of the employee as described further below) corresponds to care of the patient based on the EMR data 120. For instance, the one or more rules may relate to determining whether a pediatric employee (e.g., physician, nurse, administrative assistant, etc.) accesses an EMR of an older patient (e.g., based on an age of the patient according to the EMR data 120), as this may constitute a possible breach in accessing the EMR data 120. For example, one or more such rules may be based on a position and/or department (e.g., rules may be present for administrative assistants, but perhaps not for doctors, and/or may relate to whether patient care based on the EMR data 120 corresponds to a department of the employee based on HR data 124). Thus, in one example, a cardiology administrative assistant accessing a patient EMR with no cardiac symptom or condition history may result in detecting a possible breach in the data. In an example, rule applying component 134 may apply multiple rules in detecting a possible breach (e.g., similar last name between employee and patient along with the fact that the employee has not provided care to the patient based on the EMR data 120).

It is to be appreciated that rule applying component 134 may apply the one or more rules to filter the data for possible breaches, and the possible breaches may further be analyzed based on patterning, as described below, and/or the data may be analyzed based instead on patterning without applying the one or more rules described above. In another example, the one or more rules may relate to the patterned data, and thus rule applying component 134 may apply one or more rules to patterned data determined by data patterning component 136 to detect possible breach.

In any case, determining the at least one access event that constitute possible breach of the electronic patient data may additionally or alternatively optionally include, at Block 210, detecting one or more patterns of accessing the electronic patient data by one or more employees based on the plurality of access events. Data analyzing component 128 may include data patterning component 136 for detecting one or more patterns of accessing the electronic patient data by one or more employees based on the plurality of access events. For example, data patterning component 136 may detect the one or more patterns at least in part by clustering the data related to accessing of the electronic patient data based on detecting commonalities in the data, machine-learning commonalities in the data, network analyzing commonalities in the data (e.g., generating Markov chains), etc. The commonalities can be determined based on computing statistical inferences such that data commonalities are meaningful. For instance, data patterning component 136 may detect patterns by a given employee (e.g., typical EMR accessing times by the employee), patterns for groups of employees (e.g., determining that a group of employees typically access the same medical record, which may be in a given order or otherwise), etc. In an example, in this regard, data analyzing component 128 may determine the at least one access that constitute possible breach of the electronic patient data based at least in part on detecting that the at least one access is inconsistent with the one or more patterns determined by the data patterning component 136.

In a specific example, data patterning component 136 may detect, based on the EMR access data 122, that an employee typically accesses EMRs in the EMR data 120 very quickly (e.g., opens access and closes access of the EMR within 1 minute). Accordingly, data analyzing component 128 may determine whether EMR access data 122 includes one or more accesses by the employee that achieve a threshold duration over the normal (or computed average) for the employee, which may indicate a possible breach in accessing the EMR data 120 by the employee (e.g., when analyzed with other patterns and/or rules applied to the data). In another specific example, data patterning component 136 may detect that accesses by the employee according to the EMR access data 122 typically occur at a given workstation in the healthcare provider network (e.g., based on an identifier, network address, etc. related to the workstation), and data analyzing component 128 may determine whether the EMR access data 122 includes one or more accesses by the employees from a different workstation, which may indicate a possible breach.

In another specific example, data patterning component 136 may generate one or more patterns regarding employee transitions between EMR accesses for one or more patients (e.g., in one or more departments, etc.). In this example, data analyzing component 128 may detect transitions from one EMR access action to another in a given department (e.g., an office assistant who frequently schedules patients moving to an action of adding information to a patient's EMR) that are of low probability given an individually fit gamma distribution for the employee, that are detected to be outside of a defined number of standard deviations beyond a mean value for the employee, etc. For example, it is to be appreciated that the number of standard deviations may be specified by an administrator or other user account of the healthcare provider network platform 102 (e.g., per a given employee, group or type of employees, all employees, etc.) or otherwise configured to achieve a desired level of possible breach detection. More generally, data patterning component 136 can generate fingerprints of detected behavior patterns for one or more employees based on analyzing the EMR access data 122 in this regard, and data analyzing component 128 can determine EMR accesses that are outside of the fingerprints. For example, data patterning component 136 can generate fingerprints based at least in part on mathematically representing and characterizing the EMR access data for the given employee to detect typical patternable EMR access behavior by the employee. In addition, in an example similar to the rules-based example described above for an employee accessing an EMR for a patient related to a department (or having a condition relating to a department) inconsistent with the employee's department, it may be possible that the employee accesses such EMRs outside of the department regularly as part of her/his employment. Thus, in an example, data patterning component 136 may additionally or alternatively determine that an employee typically accesses EMRs corresponding to one or more departments (e.g., regardless of a department for the employee in HR data 124), and data analyzing component 128 may detect a possible breach where the employee accesses EMR(s) outside of the detected one or more departments for which the employee typically accesses EMRs.

In another specific example, data patterning component 136 may detect accessing of certain EMRs in the EMR data 120 by a group of employees based on the EMR access data 122. For example, data patterning component 136 may determine that a certain one or more doctors, assistants, nurses, administrative assistants, etc. typically access the same EMRs, which may indicate these employees as part of a clinical care group. Accordingly, data analyzing component 128 may determine whether EMR access data 122 indicates accesses to EMRs by a portion of the employees in the group but not by another portion, which may indicate a possible breach. For example, this may be based on a time of the accessing according to the EMR access data 122, such that an access by a portion of the employees in a group that is not within a threshold time of access by the other portion of the employees in the group may indicate a possible breach. In another example, data analyzing component 128 may determine whether EMR access data 122 indicates accesses to an EMR by the group and a corresponding access to the EMR by another employee that is not in the group, which may indicate a possible breach.

It is to be appreciated that data patterning component 136 can constantly or periodically generate the one or more patterns such that the patterns can evolve over time based on changes to other data in the healthcare provider network platform 102 (e.g., addition, movement, removal, etc. of employees in the EMR access data 122 and/or HR data 124, etc.). Moreover, for example, EMR access data 122 can be periodically received in EMR data logs, received using a request/receive mechanism (e.g., file transfer protocol (FTP)), publish/subscribe mechanism, etc.).

Method 200 also includes, at Block 212, providing an alert related to the at least one access event based on determining that the at least one access event constitutes possible breach of the electronic patient data. Data presenting component 130 can provide the alert related to the at least one access event based on determining that the at least one access even constitutes possible breach of the electronic patient data. For example, data presenting component 130 can render the alert on an interface (e.g., a dashboard interface of alerts, a patient profile interface graphically depicting EMR access data 122 related to accessing the EMR, etc.), as described further herein. The alert may allow a professional to receive the alert and further investigate the alert to determine whether a possible breach of the data has occurred and/or to remediate the possible breach. In an example, the further investigation can be facilitated by indications on interfaces presented by the data presenting component 130 that relate to rules of rule applying component 134, data patterns from data patterning component 136, etc. as described further herein.

In addition, in an example, data analyzing component 128 may determine a confidence level or priority related to a detected possible breach, which may be based on which of the one or more rules the detected possible breach satisfies, which of the one or more patterns to which the detected possible breach relates, a level of deviation from the one or more patterns, and/or the like. In this example, data presenting component 130 may provide a representation of the access event along with any confidence or priority information.

Method 200 may optionally include, at Block 214, employing feedback received related to determining the at least one access event constitutes possible breach of the electronic patient data in determining whether one or more subsequent access events constitute possible breach of the electronic patient data. For example, feedback component 132 can receive and employ feedback related to determining the at least one access event constitutes possible breach of the electronic patient data in determining whether one or more subsequent access events constitute possible breach of the electronic patient data. In an example, feedback can be provided via one or more interfaces to indicate whether a possible breach detection is actually considered a breach, whether breach detection is too conservative, and/or whether more conservative breach detection is desired. Data analyzing component 128 can utilize the feedback information to automatically activate/deactivate one or more rules used by rule applying component 134, one or more patterns detected in the EMR access data 122 by data patterning component 136, one or more numbers of standard deviations for detecting possible breaches, etc. to achieve a desired level of consideration for determining whether accesses defined in the EMR access data 122 are possible breach of the EMR data 120.

FIG. 3 illustrates an example method 300 for processing EMR access data to determine possible breaches in accessing EMRs. Method 300 includes, at Block 202, receiving data related to a plurality of access events of electronic patient data by one or more employees. Data receiving component 126 can receive data related to the plurality of access events of electronic patient data by one or more employees, as described. This can optionally include, at Block 204, receiving data from EMR access logs, EMRs, and human resources data. Thus, for example, data receiving component 126 can receive data from EMR access logs (e.g., EMR access data 122), EMRs (e.g., EMR data 120), and human resources data (e.g., HR data 124). As described, data receiving component 126 may receive this data from one or more data sources in a healthcare provider network and/or other system or network, which may be distributed across one or more networks, co-located, etc.

Method 300 also optionally includes, at Block 302, filtering the electronic patient data based on one or more whitelist events. For example, data analyzing component 128 can filter the electronic patient data based on the one or more whitelist events. This may include filtering out the whitelist events as accesses to EMR data 120 (e.g., from the EMR access data 122) that are determined to not constitute a possible breach (e.g., legitimate authorized accesses of the EMR data 120). For example, data analyzing component 128 can determine the whitelist events from EMR access data 122 as accesses that demonstrate the employee has directly treated a patient corresponding to the EMR data being accessed and/or have contributed to their care. For example, whitelist events may include appointment entry, an entry related to ordering a procedure or medication for the patient, an update to allergy information, a patient check-in, a modification to primary care provider, etc. Thus, for example, accessing of EMR data in EMR access data 122 around these whitelist events may be filtered out. For example, this may lessen processing burden for determining possible breaches from the EMR access data 122, as described further below, as statistical processing, pattern detection, etc. can occur on a subset of the entire EMR access data 122 having filtered out the whitelist events. A non-exhaustive list of example whitelist events (which can also be referred to as “positive tags”) that can be detected by data analyzing component 128 in the EMR access data 122 (e.g., by determining a type of the EMR access as specified in or otherwise determined based on the EMR access data 122) is provided below.

This employee entered allergy information for this patient. This employee initiated an admission, discharge or transfer action for this patient. This employee edited this patient's diagnoses. This employee modified identity information in this patient's record. This employee entered immunization information in this patient's record. This employee reviewed and accepted this patient's medication history. This employee created an order for this patient. This employee discontinued an order for this patient. This employee approved a medication order for this patient. This employee is the overall care provider. This employee created a Procedure note for this patient. This employee is a technologist who fulfilled an order. This employee is involved with Radiology Information Systems. This employee instantiated a procedure. This employee cancelled something in the EMR. This employee edited something in the EMR. This employee edited the patient's emergency department disposition. This employee is the patient's primary care physician (PCP). This employee is labeled as the visit provider ID, indicating they are the attending provider for the patient's visit. This employee closed the patient encounter. This employee created an appointment for this patient. This employee cancelled an appointment for this patient. This employee checked in the patient to an appointment. This employee created an after visit summary for this patient. This employee created the patient encounter. This employee updated the patient's allergies. This employee created the user ID for the patient. This employee last reviewed the patient's medications. This employee reviewed the patient's problem list. This employee edited the patient's diagnosis history. This employee has sequentially viewed more than one patient with a similar name - but only explored one record extensively. This employee accessed a patient's record with explicit permission from the compliance office. This employee is a supervisor and is connected to this patient through a whitelisted subordinate. This employee is a trusted user. This employee is authorized to access this patient's data.

Method 300 also optionally includes, at Block 304, constructing fingerprint data for the one or more employees based on the filtered data. For example, data analyzing component 128 can construct the fingerprint data for the one or more employees based on the filtered data. For example, data analyzing component 128 may construct the fingerprint data to include, from the EMR access data 122, a collection list of daily encounters of one or more employees at the healthcare institution, a collection list of accesses of a patient EMR for multiple time periods occurring throughout the day (e.g., each 15 minute period of the day) or a daily list, a collection list of employee EMR accesses of patient EMRs for multiple time periods occurring throughout the day or a daily list, a collection list of patient encounters (e.g., all patient encounters, encounters within a period of time, etc.), a collection list of synthetic department accesses, and/or the like. For example, data analyzing component 128 may determine a synthetic department for an employee based at least in part on detecting a type of EMR data 120 that is most frequently accessed by the employee (e.g., intensive care unit (ICU), emergency department, etc.). Further processing can occur on one or more of the fingerprint data collections to determine possible breach of the electronic patient data (e.g., EMR data 120), as described herein.

Method 300 also includes, at Block 306, determining at least one access event of the plurality of access events by the one or more employees that constitutes possible breach of the electronic patient data. For example, data analyzing component 128 may determine the at least one access event of the plurality of access events by the one or more employees that constitutes possible breach of the electronic patient data. For example, data analyzing component 128 may analyze the fingerprint data for a given employee with whitelist events filtered out. As described, determining the at least one access event at Block 306 may optionally include, at Block 308, detecting the at least one access event based on one or more rules. For example, rule applying component 134 can apply one or more rules to the fingerprint data to determine whether an access is a possible breach, where the one or more rules may correspond to one or more tags defined for identifying in the fingerprint data. The tags, for example, may include negative tags that are indicative of possible breach and/or neutral tags that may not alone be indicative of possible breach, but may add information to an access identified as possible breach to indicate whether the access is more or less likely a breach of the EMR data 120.

As described herein the one or more rules/tags may include a plurality of detectable events in the data. A non-exhaustive list of example rules/tags and relevant determinations made by the data analyzing component 128 to apply the rule/tag to an EMR access in the fingerprint data is provided below.

Rule/Tag Relevant Determination This employee viewed a record for Analyze fingerprint data (e.g., patient a patient that has never visited the encounter history) to determine if the healthcare institution. patient has ever visited the healthcare institution. This employee viewed a record Analyze the EMR to determine if with no clinical data. clinical data exists. This employee does not routinely Hierarchical clustering of employees work with other employees in this to determine if employee routinely patient's record. works with other employees who access this patient's record. This employee has never viewed Analyze fingerprint data to determine this patient's medical record. employee/patient combination. This employee viewed this Analyze fingerprint data (e.g., patient patient's medical record outside encounter history) to determine if the of an encounter window. EMR access is a threshold of time after a last patient encounter. This employee is not involved in Analyze fingerprint data to determine the treatment of this patient. if employee has edited medical record to indicate they are providing direct care for this patient. This employee has checked two Analyze fingerprint data to determine patients with the same address. if two patients accessed by the employee have the same address (e.g., where the accesses occur within a threshold period of time, such as 1 day). This employee shares the same Analyze fingerprint data (or access last name as this patient. logs) to determine if a patient of an accessed EMR has the same last name as the employee. This employee works in pediatrics Analyze fingerprint data and HR and viewed an adult's record. data to determine accesses by the employee and the employee's department. This employee is listed as an Analyze fingerprint data and EMR emergency contact in this data to determine if a patient of an patient's record. accessed EMR has an emergency contact with the same name as the employee. This employee works in a Analyze fingerprint data and HR department that is not related data to determine a history of to this patient's care. associated departments of a patient EMR, and determine whether the employee is in one of the departments. This employee viewed a medical Analyze fingerprint data and HR record of a hospital employee. data (or access logs) to determine whether a patient of an accessed EMR is an employee (e.g. based on name, address, social security number, etc.). This employee accessed this Analyze fingerprint data to determine record from a workstation normal workflow pattern of the outside of their normal employee (e.g., during a time period, workflow pattern. as a sequence of accesses of different types and/or from different locations, etc.) to determine if workstation is outside the normal workflow. This employee routinely times- Analyze fingerprint data to determine out of sessions on public time periods associated with EMR workstations. accesses and/or a number of EMR accesses during which timeout occurred. This employee generated a report Analyze fingerprint data to determine outside of their normal workflow normal workflow pattern of the pattern. employee (e.g., during a time period, as a sequence of accesses of different types and/or from different locations, etc.) to determine if a generated report is contrary to the normal workflow. This employee saved a report to a Analyze fingerprint data to determine suspicious location on their a save location of a report (e.g., as computer. being in a location related to a personal storage device, such as an external memory card, cloud storage location, etc.). This employee viewed this record Analyze fingerprint data to determine outside of their normal work shift. EMR accesses outside of shift, where the shift can be determined by analyzing EMR accesses to determine a typical shift and/or HR data that may specify/track the shift. This employee downloaded a Analyze fingerprint data to determine large amount of patient data. a number of fingerprints over a period of time compared to a threshold, which may be a configured threshold and/or generated based on analyzing fingerprints to determine typical accesses by the employee over the period of time. This employee printed a large Analyze fingerprint data to determine amount of patient data. a number of fingerprints related to printing over a period of time compared to a threshold (e.g., a configured or generated threshold, as described above). This employee accessed a record Analyze fingerprint data (or access for a patient who is deceased logs) to determine if an access is for an EMR of a deceased patient. This employee is an OB-GYN Analyze fingerprint data, EMR data, professional checking a male and HR data (or access logs) to patient. determine that the patient related to the accessed EMR is male, and a department of the employee as OB-GYN. This employee accessed a record Analyze fingerprint data, EMR data, for a patient who lives near the and HR data to determine an address employee. of the patient related to the accessed EMR and an address of the employee, and determine whether the addresses are within a threshold proximity. This employee has accessed a Analyze fingerprint data (e.g., a list patient's record that has been of patient accesses) to determine if dormant for a period of time. there are any accesses of the EMR within the period of time (e.g., 1 year). This employee accessed a record Analyze fingerprint data (e.g., patient for a patient that has not had an encounter data) to determine if there encounter within a period of time. are any patient encounters within the period of time (e.g., the last 60 days). This employee is registered as Analyze HR data to determine if “inactive” by the institution. employee accessing the EMR is “inactive.” This employee is not listed as Analyze fingerprint data and HR data assigned to one of the departments to determine if employee accessing this patient visited. the EMR is not assigned to a department the patient visited. This employee is a student who Analyze fingerprint data and HR accessed another student's patient data (or access logs) to determine data. if the employee is a student and if the patient related to the EMR is a student. This employee is checking their Analyze fingerprint data (and HR own medical record. data) to determine if the employee and the patient related to the EMR are the same person. This employee checks two Analyze fingerprint data to determine patients with the exact same if patients related to different EMR full name. accesses by the employee (e.g., within a period of time) have the same full name. This patient's condition is Analyze fingerprint data (e.g., patient atypical for this employee's encounter data) to determine typical access history. access history and conditions associated with the patient EMRs to determine if this access is for a different condition that is not typically accessed by the employee. This employee created a large Analyze fingerprint data to determine number of reports on this date. whether a number of reports exceeds a threhsold. This employee was logged into Analyze fingerprint data to detect multiple work stations at this multiple EMR accesses in time. overlapping periods of time. This employee has sequentially Analyze fingerprint data to detect viewed more than one patient accessing by the employee of EMRs with a similar name - and of patients having a similar name continued to explore both (e.g., same last name) within a patients records. period of time of each other. This employee normally views Analyze fingerprint data to determine a specific age group that this typical access history and ages patient does not fit into. associated with the patient EMRs to determine if this access is for a patient of a different age (e.g., exceeding a threshold difference of a typical age). This employee accessed patient Determine VIPs based on searching data for a potential VIP. local or national news feeds, encyclopedia websites, etc. for names and/or events (e.g., that the VIP may be in care of a healthcare provider), and analyze fingerprint data to detect access of the VIP EMR (e.g., based on name/location matching). This employee accessed patient Analyze fingerprint data and HR data on a subordinate or manager. data to determine accessing of a patient EMR corresponding to a subordinate or manager.

Rule applying component 134 can apply one or more of these rules/tags to the at least one event (e.g., access of an EMR) to determine whether the at least one event is a potential breach of the electronic patient data. For example, data analyzing component 128 can determine whether an event is a potential breach based on a number of rules/tags that are applied (and/or for which the relevant condition is satisfied), based on determining a weighted score of the rules/tags applied to the event, based on determining certain combinations of rules/tags applied to the event, etc. Moreover, data analyzing component 128 may determine whether an event is a potential breach based on determining patterns in the data and detecting deviations from the patterns, etc., as described herein.

As described, determining the at least one access event at Block 306 may also optionally include, at Block 310, detecting one or more patterns of accessing the electronic patient data by one or more employees based on the plurality of access events. For example, data patterning component 136 may determine the one or more patterns, as described in the rules above, such as typical electronic patient data accessing of the employee (e.g., accessing during certain times, accessing EMRs of patients of certain ages/diagnoses, etc.). In additional examples, data patterning component 136 may pattern typical accesses from EMR access data 122 for one or more employees based on determining viewing of patients in alphabetical order, determining typical patient identifier patterns used in accessing the EMR, determining that the employee usually searches by certain criteria (e.g., name, medical record number (MRN), etc.), determining that the employee normally views old encounters on certain days of the week, month, etc., determining a certain percentage of patients viewed as being male or female, determining a number of patients viewed with similar names, etc. In this regard, as described, data patterning component 136 (and/or rule applying component 134) may determine whether one or more accesses fall outside of a normal distribution or standard deviation of the pattern, and may accordingly determine at least one access (event) as a possible breach.

Method 300 also includes, at Block 312, providing an alert related to the at least one access event based on determining that the at least one access event constitutes possible breach of the electronic patient data. Data presenting component 130 can provide the alert related to the at least one access event based on determining that the at least one access even constitutes possible breach of the electronic patient data, as described. For example, data presenting component 130 can render the alert on an interface (e.g., a dashboard interface of alerts, a patient profile interface graphically depicting EMR access data 122 related to accessing the EMR, etc.), as described further herein. The alert may allow a professional to receive the alert and further investigate the alert to determine whether a possible breach of the electronic patient data has occurred and/or to remediate the possible breach. In an example, the further investigation can be facilitated by indications on interfaces presented by the data presenting component 130 that relate to rules of rule applying component 134, data patterns from data patterning component 136, etc. as described further herein.

FIGS. 4-7 illustrate example interfaces in accordance with aspects described herein with respect to implementation of healthcare provider network platform 102. In some aspects, the interfaces may include graphical user interface (GUI) screens configured to interact with one or more of the various modules/components described herein for providing/receiving information to/from users. This functionality may include substantially any suitable type of application that sends, retrieves, processes, and/or manipulates input data, receives, displays, formats, and/or communicates output data. For example, such interfaces may also be associated with an engine, editor tool, web browser, device application, etc., although other type applications may be utilized. The GUI may include a display having one or more display objects comprising, e.g., configurable icons, buttons, sliders, input boxes, selection options, menus, tabs having multiple configurable dimensions, shapes, colors, text, data and sounds to facilitate operations with the interfaces. In addition, among other things, the GUI may also receive and process user commands from a mouse, touch screen, keyboard, laser pointer, speech input, web site, remote web service and/or other devices such as a camera and/or video content, etc. to affect or modify operations and/or display of the GUI.

FIG. 4 illustrates an example interface 400 for providing alerts of possible breaches in EMR access data. For example, a compliance officer or other administrative user can log into the healthcare provider network platform 102 (e.g., via another interface), and can be authenticated to access the healthcare provider network platform 102, and in particular interface 400, etc. Interface 400 can include a list of one or more alerts 402 generated for possible breaches in EMR access data. Interface 400 shows the alerts as separated based on a determined priority. In one example, interacting with an alert (e.g., clicking on the alert) may produce another interface for investigating the alert or related information of the associated EMR access event, remediating the possible breach, indicating whether to present similar indications of possible breaches in the future, etc.

FIG. 5 illustrates an example interface 500 for displaying at least a portion of data analysis performed by a healthcare provider network platform. For example, interface 500 displays some clustering of data, which can be performed by a data patterning component 136 as described herein. For example, interface 500 can display a patient summary 502 and employee information 504 related to an access of the patient's EMR as indicated by EMR access data, as described herein. Accesses of the EMR are indicated by dots 506 over a timeline, where each dot 506 corresponds to an access or other action in an EMR of a patient by the listed employee. In addition, interface 500 can depict groupings 508 of employees that are determined to typically access the same EMRs (e.g. within a threshold period of time). For example, one grouping 508 can correlate an orthopedic clinic including a registered nurse, a physician's assistant, and a medical assistant that typically access the same EMRs (e.g., including the depicted EMR for “Frank McDaniel.” In this example interface 500, various groupings of employees associated in clinics are shown as accessing the EMR. A registered nurse that is not part of the groupings, however, and/or accessed the EMR outside a threshold time within which other employees in the grouping accessed the EMR, is shown as an alert 510 of possible breach of the data (e.g., based at least on data analyzing component 128 determining that the registered nurse is not part of the groupings). In addition, interacting with the alert 510 can cause display of additional information of the EMR access at 512.

FIG. 6 illustrates an example interface 600 for displaying at least a portion of data analysis performed by a healthcare provider network platform. For example, interface 600 displays some clustering of data, which can be performed by a data patterning component 136 as described herein, and in reference to FIG. 5. In addition, interface 600 can include an access of an EMR by office assistance “Rhonda Williams” at 602. Interacting with the access 602 on the interface 600, though not indicated as an alert, may cause display of additional information regarding the access at 604. Displaying the additional information can allow a compliance officer or other administrator to determine whether a possible breach of the data is actually a breach or not.

FIG. 7 illustrates an example interface 700 for displaying EMR access activity for a given employee 702. For a given access 704 of an EMR, patient information for the EMR can be displayed at 706 along with additional information regarding the access at 708. Employee information 702 may include access information determined by a data analyzing component 128 as described above, such as average access time, number of records viewed per day, time spent in a current EMR, etc., which can facilitate determining whether the employee is possibly breaching the EMR data (e.g., where the time spent in the current EMR is determined to be inconsistent with the average access time).

FIG. 8 illustrates an example of various negative rules/tags 802 for low level alerts that may be applied to electronic patient data, and/or additional negative rules/tags 804 for determining higher level alerts (e.g., by data analyzing component 128). For example, the negative tags 802 for low level alerts may relate to determining an employee checked an EMR for patients with the same full name (e.g., based on EMR data 120 and HR data 124), whether the employee checked an EMR for patients with the same address as theirs, whether the employee checked patients that are employed by the same healthcare provider network (e.g., EMR data 120 indicates employment and/or patient also located in HR data 124), whether an employee checked an EMR for patients with the same last name, whether a pediatrics employee checked an EMR for patients older than 22 (e.g., based on an age/date of birth in the EMR data 120), whether the employee used a workstation they do not typically use, whether the employee accessed an unusual encounter department, whether the employee presented unusual activity for 15 minutes, more generally whether accesses of electronic patient data by a given employee fell outside the normal distribution of behaviors common to employees who are similar in regards to title, department, role, types of patients they encounter, etc., as described above. The EMR access data can be run through one or more of the negative tags 802 (e.g., as one or more rules presented by rule applying component 134 for determining if the negative tags 802 exist in any of the EMR access data 122) to determine whether electronic patient data accesses satisfy one or more of the negative tags 802, and if so, this can indicate a low level alert of possible data breach.

In addition, other negative tags 804 can be applied to the data for which low level alerts are determined to possibly determine higher level alerts. For example, the other negative tags 804 can relate to determining if the employee has no previous history of accessing the patient's EMR, clustering of other employees that have checked the patient's EMR in common with the employee, and/or determining whether the employee and employees are in different clusters (which may indicate collusion among the employees in breaching the EMR data). This may cause generation of a higher level (or priority) alert, as described herein.

In a specific example, given two nurses with the same title, job description, role, department, etc, and the fact that they view the same patient EMRs, or the same type of patient EMRs based on patient diagnoses, conditions, procedures, or demographics, if accesses by one nurse are detected as different from the other (based on a statistical distribution over time, such as increased number of record views per hour, increased time in on patients medical record, access medical records from new workstation, etc), this behavior may indicate a deviation from the normal, appropriate behavior, and thus a possible breach. Accordingly, data analyzing component 128 may detect such behavior based on statistical analysis of the EMR access data 122 for the two nurses (e.g., by data patterning component 136). For example, data analyzing component 128 may evaluate a plurality of the negative tags 802 for low level alerts to detect a concert of multiple deviations around a single access event, which may increase the suspicious nature of the access.

In another example, a pediatrician may view patient records with an age distribution between 0 years old and 21 years old. The EMR access data 122 can indicate that one pediatrician views an EMR of a 55 year old patient who has never visited that pediatrician's clinic, which is inconsistent with the patient demographic of the pediatrician employee. In addition, to a determination that may relate to detecting the pediatrician accessing an EMR of a 55 year old patient and accessing an EMR of a patient that has not visited the pediatrician's clinic, data analyzing component 128 can perform additional non-rule based determinations as well. For instance, data analyzing component 128 can determine a probability that this patient's medical record is viewed by whomever the last employee to view it followed by this pediatrician to be very low (e.g., below a threshold), which may indicate possible breach of the data. Similarly, data analyzing component 128 can determine the fact that this pediatrician preformed one action in this patient EMR followed by another action to be dissimilar (e.g., outside of a statistical distribution) to the normal sequence of actions this pediatrician takes when he opens a medical record with patients with similar conditions or diagnosis, which can indicate possible breach of the data. In either case, for example, data presenting component 130 may present an indication of the possible breach on an interface for viewing by a device (e.g., device 106) to analyze, investigate, and/or remediate the possible breach (e.g., based on other data around the access as determined by data analyzing component 128, stored by EMR data 120, EMR access data 122, HR data 124, etc., and/or the like).

In another specific example, an insurance/billing specialist accesses patient EMRs at similar rates of progression (e.g., accesses new record on average of every 50 seconds). Inside every EMR, the billing specialist may view new procedures accesses that patient's insurance information. While this behavior is not perfectly repetitive, it can follow a normal distribution of likely sequences of events. If this pattern is disturbed beyond a normal distribution to view a medical record of a patient who is also a fellow employee, this may indicate a possible breach, and data analyzing component 128 may accordingly detect this disturbing of the pattern beyond a determined normal distribution in EMR access data 122 as a possible breach. For example, it can be determined that the billing specialist does not view insurance information (which is consistent with the sequence of events typically performed by the billing specialist), but instead views lab results (which is not consistent with sequence of events typically performed by the billing specialist), which may indicate possible breach. It is to be appreciated that the deviation in behavior can be detected by automatically observing baseline normalities (e.g., by a data patterning component 136) and associating the normalities to a curve based on multiple dimensions (title, department, location, date of hire, etc.). Data analyzing component 128 can then use the normalities to detect deviation and possible breach (e.g., by a data analyzing component 128), which may be based on a determined degree of deviation.

FIG. 9 illustrates an example system 900 in accordance with aspects described herein. For example, system 900 may include various distributed components as described in reference to the previous figures. System 900 may include, for example, a distributed analytics system 902, which may perform one or more functions of the components described herein (e.g., data receiving component 126, data analyzing component 128, data presenting component 130, etc.). For example, distributed analytics system 902 may receive data from a healthcare (HC) provider network platform 904 (which may be similar to HC provider network platform 102 but having the various components distributed to distributed analytics system 902). For example, HC provider network platform 904 may include an agent 906 that can operate without the HC provider network platform 904 for transferring data from one or more repositories in the HC provider network platform 904 (e.g., EMR data, EMR access data, HR data, etc., as described) to distributed analytics system 902 for subsequent analysis. For example, agent 906 may transfer the data to distributed analytics system 902 via secured hypertext transfer protocol (HTTPS) through one or more firewalls.

In an example, distributed analytics system 902 can include an analytics and extract, transform, and load (ETL) component 908 (which may be similar to and/or include at least a portion of data analyzing component 128) that receives data from one or more filter components 910 (which may also be similar to and/or include at least a portion of data analyzing component 128). For example, the filter components 910 may apply whitelist filters, as described, to filter out EMR access data that may be indicative of acceptable accesses of electronic patient data (e.g., legitimate authorized accesses, as described above), and the remaining EMR access data may be provided to the analytics and ETL component 908 for further analysis. In an example, distributed analytics system 902 may also include a product database 912 that may store data received from the one or more filter components 910, analytics and ETL component 904, etc., which may include data regarding possible breaches, general EMR access data, etc., for alerting, viewing, etc. via a service layer 914 and/or associated user interface 916.

For example, where analytics and ETL component 908 detects a possible breach, as described above, the related information may be communicated to the product database 912 and then to service layer 916 to alert an application (e.g., multi-factor application 918) of the possible breach. Based on this alert, or otherwise, a compliance team 920 (e.g., using one or more devices) may access distributed analytics system 902 via user interface 916 over HTTPS to view the possible breach and/or substantially any EMR access data (e.g., as shown in GUIs 400, 500, 600, 700, and/or similar interfaces as described herein). User interface 916 may display the data based on accessing product database 912 via service layer 914 to obtain the data for display (e.g., based on one or more queries to the product database 912). In another example, a system management team 922 (e.g., using one or more devices) may access the distributed analytics system 902 (e.g., via an authenticator application 924 and beacon server 926 architecture) to modify one or more components or related data (e.g., rules, tags, metadata, etc.) of the distributed analytics system 902.

Additionally, for example, system 900 may include a distributed key management component 930 for managing one or more security keys used in accessing data from distributed analytics system 902. For example, the keys can include one or more private keys, public keys, private/public key pairs, etc. used to authenticate requests for data from distributed analytics system 902. Additionally, in an example, cloud storage 932 can be provided for at least a portion of the data in product database 912

In some variations, aspects described herein may be directed toward one or more computer systems capable of carrying out the functionality described herein. An example of such a computer system 1000 is shown in FIG. 10.

Computer system 1000 may include one or more processors, such as processor 1004. The processor 1004 is connected to a communication infrastructure 1006 (e.g., a communications bus, cross-over bar, or network). Various software aspects are described in terms of this example computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the described subject matter using other computer systems and/or architectures. For example, processor 1004 can implement the components 126, 128, 130, 132, 134, 136, etc. described in connection with a healthcare provider network platform 102 (FIG. 1), related methods 200, 300 and/or Blocks thereof (FIGS. 2, 3), etc.

Computer system 1000 may include a display interface 1002 that forwards graphics, text, and other data from the communication infrastructure 1006 (or from a frame buffer not shown) for display on a display unit 1030. Computer system 1000 also includes a main memory 1008, preferably random access memory (RAM), and may also include a secondary memory 1010. The secondary memory 1010 may include, for example, a hard disk drive 1012 and/or a removable storage drive 1014, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, a flash memory drive, etc. The removable storage drive 1014 reads from and/or writes to a removable storage unit 1018 in a well-known manner. Removable storage unit 1018, represents a floppy disk, magnetic tape, optical disk, flash memory card, etc., which is read by and written to removable storage drive 1014. As will be appreciated, the removable storage unit 1018 includes a computer usable storage medium having stored therein computer software and/or data.

In alternative aspects, secondary memory 1010 may include other similar devices for allowing computer programs or other instructions to be loaded into computer system 1000. Such devices may include, for example, a removable storage unit 1022 and an interface 1020. Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other removable storage units 1022 and interfaces 1020, which allow software and data to be transferred from the removable storage unit 1022 to computer system 1000.

Computer system 1000 may also include a communications interface 1024. Communications interface 1024 allows software and data to be transferred between computer system 1000 and external devices. Examples of communications interface 1024 may include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc. Software and data transferred via communications interface 1024 are in the form of signals 1028, which may be electronic, electromagnetic, optical or other signals capable of being received by communications interface 1024. These signals 1028 are provided to communications interface 1024 via a communications path (e.g., channel) 1026. This path 1026 carries signals 1028 and may be implemented using wire or cable, fiber optics, a telephone line, a cellular link, a radio frequency (RF) link and/or other communications channels. In this document, the terms “computer program medium” and “computer usable medium” are used to refer generally to media such as a removable storage drive 1014, a hard disk installed in hard disk drive 1012, and signals 1028. These computer program products provide software to the computer system 1000. Aspects of the described subject matter may be directed to such computer program products.

Computer programs (also referred to as computer control logic) are stored in main memory 1008 and/or secondary memory 1010. Computer programs may also be received via communications interface 1024. Such computer programs, when executed, enable the computer system 1000 to perform the features of the subject matter described herein. In particular, the computer programs, when executed, enable the processor 1004 to perform the features of the described subject matter. Accordingly, such computer programs represent controllers of the computer system 1000.

In an aspect where the aspects described herein are implemented using software, the software may be stored in a computer program product and loaded into computer system 1000 using removable storage drive 1014, hard disk drive 1012, or interface 1020. The control logic (software), when executed by the processor 1004, causes the processor 1004 to perform the functions of the subject matter described herein. In another aspect, the subject matter described herein may be implemented primarily in hardware using, for example, hardware components, such as application specific integrated circuits (ASICs). Implementation of the hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art(s). In yet another aspect, variations of the described subject matter may be implemented using a combination of both hardware and software.

In one example, display interface 1002 may provide interfaces related to the healthcare provider network platform 102 (e.g., provided by data presenting component 130, etc.) or related GUIs 400, 500, 600, 700, and/or similar interfaces as described herein. Interaction with these interfaces may be provided via input devices connected to communication infrastructure 1006, such as a keyboard, mouse, touch screen, voice input, and/or the like.

FIG. 11 shows a communication system 1100 involving use of various features in accordance with aspects described herein. The communication system 1100 may include one or more assessors 1160, 1162 (also referred to interchangeably herein as one or more “users”, “entities,” etc.) and one or more terminals 1142, 1166 accessible by the one or more accessors 1160, 1162. In one aspect, operations in accordance with aspects described herein may include, for example, input and/or accessed by an accessor 1160 via terminal 1142, such as personal computers (PCs), minicomputers, mainframe computers, microcomputers, telephonic devices, or wireless devices, such as personal digital assistants (“PDAs”) or a hand-held wireless devices coupled to a remote device 1143, such as a server, PC, minicomputer, mainframe computer, microcomputer, or other device having a processor and a repository for data and/or connection to a repository for data, via, for example, a network 1144, such as the Internet or an intranet, and couplings 1145, 1164. The couplings 1145, 1164 include, for example, wired, wireless, or fiberoptic links. In another aspect, the methods and systems described herein may operate in a stand-alone environment, such as on a single terminal.

While the foregoing has been described in conjunction with the example aspects outlined above and further described in the figures, various alternatives, modifications, variations, improvements, and/or substantial equivalents, whether known or that are or may be presently unforeseen, may become apparent to those having at least ordinary skill in the art. Accordingly, the exemplary aspects, as set forth above, are intended to be illustrative, not limiting. Various changes may be made without departing from the spirit and scope of the subject matter described herein. Therefore, aspects described herein intended to embrace all known or later-developed alternatives, modifications, variations, improvements, and/or substantial equivalents. 

1-21. (canceled)
 22. A computer-implemented method for detecting a breach in access of electronic patient data, the method comprising: receiving, by one or more processors of a patient privacy monitoring server, access data from a plurality of electronic patient data access devices situated at various locations, the access data comprising a plurality of electronic patient data access events by one or more employees; applying, by the one or more processors, at least one rule of a plurality of rules to the access data to determine at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes at least one possible breach of electronic patient data, wherein the plurality of rules correspond to detected common data among the access data and human resources (HR) data; detecting, by the one or more processors, that the at least one possible breach of the electronic patient data is inconsistent with at least one data pattern of a plurality of data patterns, wherein the plurality of data patterns correspond to a plurality of detected commonalities in the access data; in response to the detecting, generating, by the one or more processors, an alert associated with the at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes the at least one possible breach of electronic patient data; and causing to display, by the one or more processors, the alert on a user interface of a user device.
 23. The computer-implemented method of claim 22, wherein the detecting includes using machine-learning to detect at least one commonality of the plurality of detected commonalities, clustering the access data based on the at least one commonality, or computing a statistical inference to detect the at least one commonality.
 24. The computer-implemented method of claim 22, wherein the at least one rule of the plurality of rules is based on an employee position or an employee department.
 25. The computer-implemented method of claim 22, wherein the plurality of data patterns includes a pattern of a particular employee or a pattern of a group of employees.
 26. The computer-implemented method of claim 22, the applying further comprising: applying, by the one or more processors, at least one additional filtering rule to the access data to prevent excessive false positives.
 27. The computer-implemented method of claim 22, further comprising: regenerating, by the one or more processors, the at least one data pattern based on changes to the access data or HR data.
 28. The computer-implemented method of claim 22, further comprising: receiving, by the one or more processors, feedback information indicating whether the at least one possible breach is actually a breach.
 29. The computer-implemented method of claim 28, further comprising: utilizing, by the one or more processors, the feedback information to activate or deactivate at least one rule of the plurality of rules.
 30. The computer-implemented method of claim 28, further comprising: utilizing, by the one or more processors, the feedback information to activate or deactivate at least one pattern of the plurality of data patterns.
 31. A system for detecting a breach in access of electronic patient data, the system comprising: one or more processors; and one or more computer readable storage media storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising: receiving access data from a plurality of electronic patient data access devices situated at various locations, the access data comprising a plurality of electronic patient data access events by one or more employees; applying at least one rule of a plurality of rules to the access data to determine at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes at least one possible breach of electronic patient data, wherein the plurality of rules correspond to detected common data among the access data and human resources (HR) data; detecting that the at least one possible breach of the electronic patient data is inconsistent with at least one data pattern of a plurality of data patterns, wherein the plurality of data patterns correspond to a plurality of detected commonalities in the access data; in response to the detecting, generating an alert associated with the at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes the at least one possible breach of electronic patient data; and causing to display the alert on a user interface of a user device.
 32. The system of claim 31, wherein the detecting includes using machine-learning to detect at least one commonality of the plurality of detected commonalities, clustering the access data based on the at least one commonality, or computing a statistical inference to detect the at least one commonality.
 33. The system of claim 31, wherein the at least one rule of the plurality of rules is based on an employee position or an employee department.
 34. The system of claim 31, wherein the plurality of data patterns includes a pattern of a particular employee or a pattern of a group of employees.
 35. The system of claim 31, the applying further comprising: applying at least one additional filtering rule to the access data to prevent excessive false positives.
 36. The system of claim 31, further comprising: regenerating the at least one data pattern based on changes to the access data or HR data.
 37. A non-transitory computer readable media storing instructions which, when executed by one or more processors, cause the one or more processors to perform operations for detecting a breach in access of electronic patient data, the operations comprising: receiving access data from a plurality of electronic patient data access devices situated at various locations, the access data comprising a plurality of electronic patient data access events by one or more employees; applying at least one rule of a plurality of rules to the access data to determine at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes at least one possible breach of electronic patient data, wherein the plurality of rules correspond to detected common data among the access data and human resources (HR) data; detecting that the at least one possible breach of the electronic patient data is inconsistent with at least one data pattern of a plurality of data patterns, wherein the plurality of data patterns correspond to a plurality of detected commonalities in the access data; in response to the detecting, generating an alert associated with the at least one electronic patient data access event of the plurality of electronic patient data access events that constitutes the at least one possible breach of electronic patient data; and causing to display the alert on a user interface of a user device.
 38. The non-transitory computer readable medium of claim 37, further comprising: regenerating the at least one data pattern based on changes to the access data or HR data.
 39. The non-transitory computer readable medium of claim 37, further comprising: receiving feedback information indicating whether the at least one possible breach is actually a breach.
 40. The non-transitory computer readable medium of claim 39, further comprising: utilizing the feedback information to activate or deactivate at least one rule of the plurality of rules.
 41. The non-transitory computer readable medium of claim 39, further comprising: utilizing the feedback information to activate or deactivate at least one pattern of the plurality of data patterns. 