Tod Sedbrook Richard Newmark University of Northern Colorado PROCESSING EVIDENCE DOCUMENTS WITH SEMANTIC WEB TECHNOLOGIES.

Slides:



Advertisements
Similar presentations
The Advanced Medical Home ACP Attributes of Advanced Medical Home Evidence-based care/clinical decision support Chronic care model approach for all patients.
Advertisements

Todd Frech Ocius Medical Informatics 6650 Rivers Ave, Suite 137 North Charleston, SC Health Insurance Portability.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Confidentiality and HIPAA
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
CHAPTER © 2012 The McGraw-Hill Companies, Inc. All rights reserved. 2 HIPAA, HITECH, and Medical Records.
Westbrook Technologies from Document Management’s Role in HIPAA.
NAU HIPAA Awareness Training
SLIDE 1 Westbrook Technologies from Fortis: A Healthcare Solution for Medical Records, Billing and HIPAA.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2.5 HIPAA Legislation and its Impact on Physician Practices 2-15 The Health Insurance Portability.
Are you ready for HIPPO??? Welcome to HIPAA
Making the Difference in Referral & Communication Systems September 2012 Emerald Health Exchange.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
Medicaid Information Technology Architecture (MITA) Where Louisiana Medicaid is Today and Where it Will To Be in the Future April 17, 2012.
WHAT'S AHEAD? Kathy Whitmire Dale Gibson February 15, 2011 HIPAA 5010, ICD-10, ACO's, VBP, HIGLAS, PECOS.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Enabling Health IT National Broadband Plan’s Recommendations for Health Care HIMSS10 Annual Conference March 2, 2010.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Health Insurance Portability and Accountability Act (HIPAA)
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
State Alliance for e-Health Conference Meeting January 26, 2007.
Compliance with FDA Regulations: Collecting, Transmitting and Managing Clinical Information Dan C Pettus Senior Vice President iMetrikus, Inc.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Chapter 6 – Data Handling and EPR. Electronic Health Record Systems: Government Initiatives and Public/Private Partnerships EHR is systematic collection.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
THE TENTH NATIONAL HIPPA SUMMIT ELECTRONIC HEALTH RECORDS NATIONAL HEALTH INFORMATION INFRASTRUCTURE LEGAL ISSUES APRIL 7, 2005 Paul T. Smith, Esq. Partner,
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Sachin H. Jain, MD, MBA Office of the National Coordinator for Health IT United States Department of Health and Human Services The Nation’s Health IT Agenda:
iSecurity Compliance with HIPAA
UNDERSTANDING WHAT HIPAA IS AND IS NOT
Diana K. “Di” Hall, CPCS CPMSM – Sr. Director, Compliance & Quality
Chapter 3 Legal Issues.
Understanding HIPAA Dr. Jennifer Lu.
By: Eamon Callahan and Wilston Johnston
Electronic Health Information Systems
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Introduction to the PACS Security
Presentation transcript:

Tod Sedbrook Richard Newmark University of Northern Colorado PROCESSING EVIDENCE DOCUMENTS WITH SEMANTIC WEB TECHNOLOGIES

Improve healthcare network monitoring Find ways evidence documents could be augmented with semantic tools to enhance their data and processing visibility Support explicit business rules that direct exchange processes Explore an upper level REA ontology Systematize evidence documents’ contents Design prototype using embedded semantic rules to reason about updates and resource exchanges

Urgent need for Heath Information Network Monitoring Currently 4% of U.S. physicians currently use electronic health records, but failure to make those records interoperable has affected efficiency and patient care. "We will make the immediate investments necessary to ensure that within five years all of America's medical records are computerized. He said that electronic health records could prevent medical errors, save lives and create hundreds of thousands of jobs.” President Obama

Case Study Background HIPPA- The Health Insurance Portability Act $20 billion to modernize health information technology systems Part of $825 Billion Economic Stimulus Plan Goal: Improved efficiency in healthcare delivery Requires standardization and electronic data interchange Enforcing data integrity, confidentiality and availability Enforce patient care standards

Technical Safeguards HIPPA Audit Controls Section: (b) “This standard requires implementing hardware, software and or/procedural controls that record and examines activity in information systems”

Health Information Networks must Demonstrate HIPPA Compliance U.S Centers for Medicare and Medicaid Services becoming more aggressive and proactive in auditing HIPPA security compliance Organizations increasingly need to develop compliance strategy and controls

Modeling with Evidence Documents HIPPA evidence documents act as 1)an independent and visual representation that provides a traceable record of commitments and evidence of information exchange and 2) a data structure that provides information to guide exchange processes that facilitate the transfer of patient rights and resources.

Access control - Controlling system access in accordance with a policy Establishing and terminating users' access to systems housing electronic patient health information (ePHI) for Specialist Consults

Design Goals Demonstrate Semantic tools to audit policies for care provider consultations Auditing of Evidence Documents across heterogeneous care provider organizations

UML Model of Evidence Documents Tradable Evidence Documents confers Right to resources

Hospital Liability for non Verification of Patient Referrals HIPPA regulations Require hospital partners To verify access To referral documents

REA Policy for Evidence Document Exchange Automating Monitoring of REA Policy for Exchange of HIPAA controlled Documents

REA Operational Model for referring a patient to a specialist

Use-Case: Policy Level for Referral To A Specialist Policies 1 and 2. Patient must be eligible and the referring physician must be approved An eligible patient type has a documented need and has granted approval An approved referring physician type has primary care responsibility for a patient and is part of a general internist group

Use-Case for Referral (cont) Policy 3. Select an Approved Specialist Clinician An approved specialist type has clinical hospital privileges and is part of a specialist group

Policy Level Classification Formalized Policy Approved Specialist Type: Anything that has at least one Hospital Privilege that is clinical and has a least One Role as a Specialist

Approved Referral: A Referral that has a least one patient Referral that is an Eligible Patient Type and has at least one clinical approval that is a Referring Clinician Type

HTML + RDFa Markup Patient Referral Referring Physician Credentials Consulting Physician Credentials Machine Readable Evidence Documents Health Information Network

Patient Referral Referring Physician Credentials Consulting Physician Credentials Health Information Ontology OWL Inferences RDF patient and provider data Audit Compliance Policy REA Ontology

RDFa Markup embedded in Evidence Documents Consulting Physician Provider Name: Dr. Howser Clinical Authorization: Specialist Physician Referral Privileges: Clinical Consultant Human View “ <span rel="rdf:type" href= > <span rel="hc:has_Consultant_Priviledge" href= > </span <span rel="hc:has_Role" href=“ HTML & RDFa Mark-up Importable RDF GRDDL of HTML &RDFa Transform

Knowledge level OWL descriptions hc:Approved_Consulting_Clinician a owl:Class ; rdfs:subClassOf REAontology:EconomicAgentType ; owl:equivalentClass [ a owl:Class ; owl:intersectionOf ([ a owl:Restriction ; owl:onProperty hc:has_Hospital_Priviledge ; owl:someValuesFrom hc:Clinical ] [ a owl:Restriction ; owl:onProperty hc:has_Role ; owl:someValuesFrom hc:Specialist ]) ].

Automated Policy Based Inference Classification into Types Approved Specialists Eligible Patients Referring Clinicians

Higher Level Policy Based Inference Eligible Patient Type Approved Referral Type Referring Clinicians Type Approved Referral: Is a Referral that has a least one patient Referral that is an Eligible Patient Type and has at least one clinical approval that is a Referring Clinician Type Hc:x123 Patient referral Hc:P123 Clinical Approval Hc:x123 Hc:P123 Clinical Approval Patient referral Inferred Referral Evidence Document

Inference Processes

System Concerns Evidence Documents: Assure safety and confidentiality of patient health records Track and approve policy based access or disclosure of medical records; Penalty Patients can recover damages from an entity that improperly used or disclosed personal health information.