Share with Protections

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Advanced Issues in HIPAA Research Compliance The Sixth National HIPAA Summit March 27, 2003 Kim P. Gunter Senior Consultant.
FERPA: Family Educational Rights and Privacy Act
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Overview of the Privacy Act
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Confidentiality and HIPAA
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
Data Ownership Responsibilities & Procedures
Office of Research Oversight. Working Group Report Slide 2.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Columbia University IRB IRB 101 September 21, 2005 George Gasparis, Executive Director, CU IRB Asst. V.P. and Sr. Asst. Dean for Research Ethics.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
HIPAA PRIVACY AND SECURITY AWARENESS.
Medical Law and Ethics Lesson 4: Medical Ethics
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
Compliance with FDA Regulations: Collecting, Transmitting and Managing Clinical Information Dan C Pettus Senior Vice President iMetrikus, Inc.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
 The use of telecommunications technology to provide, enhance, or expedite health care services.  Accessing off-site databases, linking clinics or physicians'
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Classified information in Estonia: The role of the archives Priit Pirsko EBNA meeting in Brussels 18–19 November 2010.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1.WHAT DOES CAPE TOWN MEAN FOR CANADA?  U.S. Rating Agencies analyzed Air Canada EETC Issue of Series A, B and C Aircraft Notes and Critical Importance.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
FERPA Family Educational Rights and Privacy Act
Project Proposal to IHE IHE ITI Representational State Transfer (REST) Transport Implementation Guide for Data Segmentation for Privacy (DS4P) Submitted.
Documentation and Medical Records
Health Information Management Technology: An Applied Approach
Privacy & Confidentiality
Providing Access to Your Data: Handling sensitive data
HIPAA Administrative Simplification
Professional Standards
Psychiatric Advance Directives
HOGAN & HARTSON, L.L.P. “Publications” “Health”
Export Controls – Export Provisions in Research Agreements
Privacy & Access to Information
Confidential Records and Protected Disclosures
Health Advocate HIPAA Privacy Information
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Employee Privacy and Privacy of Employee Information
The HIPAA Privacy Rule and Research
of social security systems, COM (2016)815”
FERPA For New Faculty Lawrence F. Glick Sr. Associate General Counsel
Making Your IRBs and Clinical Investigators HIPAA-Ready
Exploring 45 CFR , Criteria for IRB Approval of Research
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Ethics Committee Guidelines
13 Managing Medical Records Lesson 3:
HIPAA Privacy and Security Update - 5 Years After Implementation
Regulatory Perspective of the Use of EHRs in RCTs
Share with Protections
Part 1: Controlled Unclassified Information (CUI)
Presentation transcript:

Share with Protections 6/18/2019 Mike.davis@va.gov

Overview DS4P combined with “Share with Protections” provides: 1) critical conceptual components supporting goals of the 21st Century Cures Act, TEFCA and ONC’s interoperability NPRM and; 2) implementing foundations for interoperability improvements capable of eliminating intentional or systemic information blocking as an impediment to accessibility.

As-Is Typically, unless the patient affirmatively makes the choice to share some protected information, it is blocked. The blocking may be legal, but the net result is information is not shared. Second, presented in this way, a patient, likely already in stress, must calculate the benefits of not sharing (the de-default and presumptively best choice), or drawing upon their own courage to over-ride their provider in order to share. In the case that most patients actually give their consent, the provider is then left with a mountain of paperwork to maintain and manage.

Result of Not-Sharing The current opioid/methamphetamine/fentanyl crisis touches both information blocking and potentially patient safety issues. Efforts to give providers access to state level prescription information have been less than effective and circumvent privacy by providing a “back door” to sensitive conditions for patients that may have chosen not to share in the first place. No consent should mean that treating clinicians do not have access without patient consent. Providing clinicians access through state prescription registries, without consent, while well-intended, violates this principal. Recognize that not-sharing is a patient-safety issue.

Introducing “Share with Protections “ (1): 1991 Institute of Medicine: “Legislation should clearly establish that the confidentiality of person- identifiable data is an attribute afforded to the data elements themselves, regardless of who holds the data. “Big Data Proxies and Health Privacy Exceptionalism” legal paper” “Of considerable importance to the arguments advanced in this article, HIPAA does not literally protect data. That is, the data subject’s privacy rights do not attach to and flow with the data. HIPAA, like the common law rules that preceded it,13 created a liability rather than a property model.14 Unlike those common law rules (such as the breach of confidence), HIPAA provides that the liability rule’s remedy inures benefit to the regulator rather than the data-subject.”

Introducing “Share with Protections “ (2): A 2013, Mckinsey report proposed a new notion for healthcare: “share with protections.” “Shift the collective mind-set about patient data to ‘share, with protections’ rather than ’protect.’ With the more widespread release of information, the government, leading companies, and research institutions need to consider regulations about its use, as well as privacy protections. To encourage data sharing and streamline the repetitive nature of granting waivers and data-rights administration, it may be better for data approvals to follow the patient, not the procedure. Further, data sharing could be made the default, rather than the exception. It is important to note, however, that as data liquidity increases, physicians and manufacturers will be subject to increased scrutiny, which could result in lawsuits or other adverse consequences. We know that these issues are already generating much concern, since many stakeholders have told us that their fears about data release outweigh their hope of using the information to discovered new opportunities.”

HL7 DS4P Plus Share with Protections Today, HL7 standards support an updated vision of DS4P which combined with “share was protections” supports ONC’s TEFCA and 21st Century Cures NPRM vision of interoperability and sharing (the opposite of information blocking). Data is always shared by default, accompanied by enduring security labels, Originators classification “flows with the data” Recipient retains (persists) and honors labels Recipients only allow access by staff with a valid “need to know”. To do this, each receiving organization would be responsible for managing and granting “Clearances” to individuals based on job description, assigned duties and policy

Results Patient confidence that more highly sensitive information will continue to be appropriately protected even after disclosure in the same way as it was when originally created and that disclosure does not result in unintended “declassification” and exposure to persons who do not actually need this information for their treatment or the performance of their duties. With “Share with Protection” elements in place, it is now possible to make data sharing the default.

Use Case Descriptions

Requirements 1 No. Requirement Enforcing Party General 1 Originators shall apply HL7security labels, including any handling instructions, to all health information disclosures at the Document, Section and Entry levels according to policy. SLS   Originator applied security labels shall use HL7 standard terminology Originators who are also federal agencies may apply security labels for Controlled Unclassified Information as required by regulation. “Recipients of labeled data are obligated to honor and enforce received labels and to persist these labels and associated handling instructions upon redisclosure”. ACS, Cache, EHR Recipients shall ensure that only those individuals under their authority having a valid need to know, and appropriate clearance may access healthcare information. ACS Recipients shall store information containing CUI classifications only in media properly marked IAW NARA guidelines. EHR, Cache Recipients shall not de-classify information containing security labels except as permitted by the Originator.

Requirements 2 Requirement Enforcing Party No. QHIN   Records received by QHIN may be stored in QHIN or Participant DB QHIN, EHR, Cache Participants Participant actions must be mediated by ACS based on permissions/clearances ACS Participant Member Received Records may be directly viewable by Participant Member Cache, ACS All Participant Member access must be controlled by policy. Cache Records must be labeled on disclosure SLS Incoming records must be labeled else rejected Cache records must be labeled Cache records may be automatically updated/label on schedule (e.g. every 24 hrs) EHR EHR may have a view on labeled records or as required by law/policy EHR records may be exported to Cache EHR, Cache Received Records may be integrated into HER