<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 11 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Verdana;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman";}
a:link, span.MsoHyperlink
        {color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {color:purple;
        text-decoration:underline;}
span.EmailStyle19
        {mso-style-type:personal-compose;
        font-family:Arial;
        color:windowtext;}
p.style4, li.style4, div.style4
        {mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        font-size:12.0pt;
        font-family:"Times New Roman";}
@page Section1
        {size:612.0pt 792.0pt;
        margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.Section1
        {page:Section1;}
 /* List Definitions */
 @list l0
        {mso-list-id:113910216;
        mso-list-template-ids:-1103864532;
        mso-list-style-name:Style2;}
@list l0:level1
        {mso-level-tab-stop:18.0pt;
        mso-level-number-position:left;
        margin-left:18.0pt;
        text-indent:-18.0pt;}
@list l0:level2
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level3
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:108.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l0:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level5
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level6
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:216.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l0:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level8
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level9
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:324.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l1
        {mso-list-id:1798182944;
        mso-list-template-ids:871267982;
        mso-list-style-name:Style1;}
@list l1:level1
        {mso-level-tab-stop:18.0pt;
        mso-level-number-position:left;
        margin-left:18.0pt;
        text-indent:-18.0pt;}
@list l1:level2
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1:level3
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:108.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l1:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1:level5
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1:level6
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:216.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l1:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1:level8
        {mso-level-number-format:alpha-lower;
        mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l1:level9
        {mso-level-number-format:roman-lower;
        mso-level-tab-stop:324.0pt;
        mso-level-number-position:right;
        text-indent:-9.0pt;}
@list l2
        {mso-list-id:1996835409;
        mso-list-template-ids:1987754498;}
@list l2:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l2:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:"Courier New";
        mso-bidi-font-family:"Times New Roman";}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
-->
</style>

</head>

<body lang=EN-US link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><a href="http://www.ehealthinformation.ca/CAI/index.asp">http://www.ehealthinformation.ca/CAI/index.asp</a><o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>

<p class=style4><font size=1 color=black face=Verdana><span style='font-size:
8.5pt;font-family:Verdana;color:black'>With the increasing adoption of
electronic medical/health records and the rising use of electroinc data capture
tools in clinical research, large electronic repositories of personal health
information (PHI) are being built up. At the same time, large medical data
breaches are becoming common. Data breaches may be caused by errors committed
by insiders at the data custodian sites, or by malicious insiders. Data
breaches can also be caused by outsiders breaking into the data repositories.
These data breaches represent legal and financial liabilities for the data
custodians, and erode public trust in the ability of data custodians to manage
their PHI.<o:p></o:p></span></font></p>

<p class=style4><font size=1 color=black face=Verdana><span style='font-size:
8.5pt;font-family:Verdana;color:black'>An area that has grown in importance to
manage the risks from breaches is data leak prevention (DLP). DLP technologies
monitor communications or networks to detect PHI leaks. When a leak is detected
the affected individual or organization is notified, at which point they can
take remedial action. DLP can prevent a PHI leak or detect it after it happens.
For example, if DLP is deployed to monitor email then a PHI alert can be
generated before the email is sent. If DLP is used to monitor PHI leaks on the
Internet (e.g., on peer-to-peer file sharing networks or on web sites), then
the alerts pertain to leaks that have already occured, at which point the
affected individual or data custodian can attempt to contain the damage and
stop further leaks.<o:p></o:p></span></font></p>

<p class=style4><font size=3 face="Times New Roman"><span style='font-size:
12.0pt'>Computational AI is a key enabling technology for next-generation DLP
technologies. This workshop aims to bring together researchers working on
computational tools for DLP.  Topics of interest include, but are not limited </span></font><font
size=1 color=black face=Verdana><span style='font-size:8.5pt;font-family:Verdana;
color:black'><o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><font
size=1 color=black face=Verdana><span style='font-size:8.5pt;font-family:Verdana;
color:black'>+ reviews: reviews of DLP systems and methods; and reviews of PHI
leaks that are occuring. <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><font
size=1 color=black face=Verdana><span style='font-size:8.5pt;font-family:Verdana;
color:black'>+ methods: detection of personally identifying information in
text;  detection of health information in different types of text (e.g.,
professionally written vs. lay person generated); and re-identification risk
assessment;<o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><font
size=1 color=black face=Verdana><span style='font-size:8.5pt;font-family:Verdana;
color:black'>+ applications: monitoring the web and peer-to-peer file sharing
networks for PHI leaks; detection of PHI in email or other communications; and tools
for dealing with PHI leaks in an automated way (e.g., de-identification). <o:p></o:p></span></font></p>

<p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><font
size=1 color=black face=Verdana><span style='font-size:8.5pt;font-family:Verdana;
color:black'>+ evaluation: empirical evaluation of deployed systems; theoretical
methods of risk assessment; and new methods for evaluating such systems. <o:p></o:p></span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'><o:p> </o:p></span></font></p>

</div>

</body>

</html>