Skip to article frontmatterSkip to article content

Security Overview

Security Overview: Privacy and Compliance

JupyterHealth Exchange (JHE) provides technical capabilities for handling sensitive health data with security controls that support compliance with healthcare privacy regulations including HIPAA (Health Insurance Portability and Accountability Act) and GDPR (General Data Protection Regulation).

Understanding HIPAA Applicability

Data Classification

Before Upload to JHE (in CommonHealth app):

After Upload to JHE (in research platform):

Key Principle: JHE treats all data with PHI-level security controls regardless of legal classification, enabling organizations to meet HIPAA requirements when necessary.

Regulatory Framework

HIPAA-Ready Architecture

JHE implements technical, administrative, and physical safeguards that support HIPAA compliance when required:

Technical Safeguards:

Administrative Safeguards:

Physical Safeguards:

GDPR Compliance

For European patients and research participants, JHE supports GDPR requirements:

Lawful Basis for Processing:

Data Subject Rights:

Data Protection Principles:

Authentication and Authorization

User Types and Access Control

JHE has three distinct user types with different authorization models:

  1. Patient: Self-access to own data and consent management. Patients always have full control over their own records without requiring roles.

  2. Practitioner: Organization-scoped access with hierarchical roles (Viewer, Member, Manager)

  3. Super Admin: System administration with full access (logged and audited)

For detailed information on roles, permissions, governance best practices, and API examples, see Role-Based Access and Governance.

Authorization Enforcement

JHE enforces authorization through multiple layers:

  1. Authentication: Valid OAuth 2.0 token required

  2. User Type Identification: Patient, Practitioner, or Super Admin

  3. Organization Membership: Practitioners must belong to organization; patients must be enrolled

  4. Study Enrollment: Patient must be enrolled in the specific study

  5. Consent Verification: Patient must have consented to share the data type with that study

  6. Role Permission Check: Viewer (read-only), Member (patient management), Manager (full admin)

OAuth 2.0 Flow

JHE uses OAuth 2.0 for authentication:

  1. Client authenticates via OAuth provider (e.g., CommonHealth app)

  2. Authorization code returned to client

  3. Access token obtained via token exchange

  4. API requests include Authorization: Bearer {token} header

  5. Token validation verifies user identity and type

Data Protection Mechanisms

Encryption

At Rest:

In Transit:

Consent is not just a regulatory checkbox - it’s the primary authorization mechanism. Every FHIR query checks whether the patient has consented to share the requested data type with the specific study before returning observations:

Audit Trail

All consent-related actions are logged:

Consent Changes: Each consent decision is recorded with an immutable timestamp, creating a permanent audit trail of when consent was granted or revoked.

Who Changed What:

Data Access:

Privacy by Design

Principle of Least Privilege

Data Minimization

Purpose Limitation

Transparency

Patients can view their consent status through the API, which returns all studies requesting consent, the current consent status for each data type in each study, and timestamps of consent changes. This transparency allows patients to understand exactly how their data is being shared.

Security Considerations for Researchers

What Researchers Can Access

With Patient Consent:

Cannot Access:

Consent is enforced at query time, not upload time. When data is uploaded from the CommonHealth app, it’s stored regardless of current consent status. However, when researchers query data, the system checks active consent and only returns observations for which the patient has granted permission.

This design ensures:

Security Monitoring and Incident Response

What JHE Provides

Built-in Logging Infrastructure:

Authorization Checks:

Organizations deploying JHE should implement:

Application Monitoring:

Infrastructure Monitoring:

Incident Response Planning:

Limitations and Future Enhancements

Current Limitations

No Data Retention Policies:

No Built-in Monitoring or Alerting:

Limited Audit Logging (HIPAA Compliance Gap):

Conclusion

JHE implements security and privacy controls through:

While current implementation provides strong foundational security, ongoing enhancements to audit granularity, automated lifecycle management, and breach detection will further strengthen privacy protections.

Learn More