Privacy and Security in the Direct Context Session 6 April 12, 2010.

Slides:



Advertisements
Similar presentations
National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
Advertisements

NRL Security Architecture: A Web Services-Based Solution
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
Chapter 3 Health Care Information Systems: A Practical Approach for Health Care Management 2nd Edition Wager ~ Lee ~ Glaser.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Certificate Interoperability S&I Framework Initiative Final Report August 17, 2011.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Connecticut Ave NW, Washington, DC Direct Exchange from Provider to Patient/Consumer ….and Back! David C. Kibbe, MD MBA.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Recently Issued OHRP Documents: Guidance on Subject Withdrawal and Draft Revised FWA Secretary’s Advisory Committee on Human Research Protections October.
Direct Project Scalable Trust and Trust Bundles. 12/06/10 Overview What is Scalable Trust State of Trust Trust Issues Trust Solutions Trust Bundle Demo.
Information Security Policies and Standards
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Connecting Health and Care for the Nation: A Shared Nationwide Interoperability Roadmap – DRAFT Version 1.0 Joint FACA Meeting Chartese February 10, 2015.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
Connecticut Ave NW, Washington, DC Direct Exchange An Introduction for Providers Engaged in Stage 2 Meaningful Use David.
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair Provider Authentication Recommendations November 19, 2010.
SWITCHaai Team Federated Identity Management.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Connecticut Ave NW, Washington, DC HISP Policy “HP” 1.0 Overview Policy Document available at DirectTrust.Org Presented.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
EQARF Applying EQARF Framework and Guidelines to the Development and Testing of Eduplan.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
HIT Policy Committee Privacy & Security Tiger Team Update Deven McGraw, Co-Chair Center for Democracy & Technology Paul Egerman, Co-Chair June 25, 2010.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 18, 2013.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Health Delivery Services May 29, Eastern Massachusetts Healthcare Initiative Policy Work Group Session 2 May 29, 2009.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Scalable Trust Community Framework STCF (01/07/2013)
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair July 21, 2010.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
A NATIONAL HIPAA SUMMIT AUDIOCONFERENCE Davis Wright Tremaine LLP Legal Requirements For Vendor And Clearinghouse HIPAA Compliance; Business Associate.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Roundtable on Privacy in Transition: Is Privacy Policy Working in the Healthcare Sector?
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Pennsylvania Health Information Exchange NJHIMSS - DVHIMSS Enabling Healthcare Transformation Through Information Technology September, 2010.
Query Health Operations Workgroup Standards & Interoperability (S&I) Framework October 13, :00am – 12:00pm ET.
Audit Trail LIS 4776 Advanced Health Informatics Week 14
HIPAA Administrative Simplification
Policies for Information Sharing
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Appropriate Access InCommon Identity Assurance Profiles
HIPAA Privacy and Security Update - 5 Years After Implementation
Presentation transcript:

Privacy and Security in the Direct Context Session 6 April 12, 2010

Agenda A review and discussion of privacy and security as approached by the Direct Project, including consent and encryption issues Presenter –David McCallie Jr., MD, VP Medical Informatics, Cerner Corporation Q&A Poll 2

Direct Project High-Level Overview Specific privacy and security needs of the Direct Project: –Understanding patient consent –Relationship to HISPs –Build trust framework –Identity assurance –Certificate management Developed Pilot Privacy & Security Standards based on the HIT Policy Committee’s Recommendations to ONCRecommendations to ONC –These standards are not final – “NwHIN Governance” NPRM soon –“Best practice,” rather than regulation –ONC/HHS is in the process of vetting the HIT Policy Committee Recommendations to reach HHS policy decisions on these issues 3

HIT Policy Committee (Privacy and Security Tiger Team) Consent & Directed Exchange Recs to ONC (2010) “Directed” exchange between providers treating the patient does not require patient consent beyond what is required in existing law. Assumptions: –“Push” exchange model – originated by provider treating the patient –The provider is in control of the decision to share the data –Information is exchanged for treatment purposes (TP&O) –Adherence to Fair Information Practice Principles –Messages are encrypted, so that no intermediary has access to PHI –Patient data is not retained for purposes other than processing and delivering the message Implications: –If these conditions are not met, additional patient consent would be needed (“meaningful” choice must be offered to the patient) 4

Direct Project and Health Information Service Providers (HISPs) When the HISP functions are wholly contained within the organizational boundaries of a HIPAA Covered Entity, the issues discussed in following slides do not generally apply, because the data use, retention, and disclosure decisions are made by the Covered Entity itself, under the full protections of HIPAA. Directed exchange where an external HISP could have access to unencrypted data (managing the private keys of the address holder) should operate under a standard Business Associate Agreement if the Direct address holder is part of a Covered Entity. If the address holder is not covered under a CE, then the HISP should have strong legally enforceable contractual obligations that provide equivalent protection for individuals to those provided by HIPAA. HISP to HISP Business Associate Agreements are not required when content is properly encrypted. Source: Direct Project, Best Practices for HISPs, 5

Direct Project Security Overview Enabling Message Handling Trust between Participants: –Authenticate the sender & validate that you trust the receiver –Validate the identity & trust of sender when information is received –Provide non-repudiation service that assures the origin of information –Allow a Direct Project participant to specify which participants they trust to exchange information Protecting the Information Exchanged: –Ensure information including PHI that is exchanged between Direct Project participants is encrypted during transit. –Verify that information exchanged between Direct Project participants was not altered in transit. Policy –Ensure that the technology choices enable different policy and trust frameworks that might co-exist across various organizations. Direct security guiding principle: Messages go where they are meant to, are not altered during transmission, and are not seen by anyone for whom they are not intended. 6

Digital Certificate Trust Models 7

Direct Project Privacy and Security Best Practices for HISPs - Security Regardless of legal requirements, all HISPs will hold themselves to the provision of the HIPAA Security Rule, and, to the extent that it is relevant and consistent with the Security Rule, will follow the guidelines of PCI-DSS.HIPAA Security RulePCI-DSS HISPs that manage private keys must perform specific risk assessment and risk mitigation to ensure that the private keys have the strongest protection from unauthorized use. –That risk assessment must address the risk of internal personnel or external attackers gaining unauthorized access either to the keys or to the health information functions for which the keys enforce trust. HISPs that manage trust anchors on behalf of their customers must have well defined, publicly available policies for evaluating the certificate issuance policies of those trust anchors, in accordance with the Certificate Pilot Recommendations. Certificate Pilot Recommendations 8

Privacy and Security BP for HISPs: Transparency and Data Handling/Retention HISPs must include all data collection, use, retention and disclosure policies (including rights reserved but not exercised) in BAAs or other service agreements. HISPs must minimize data collection, use, retention and disclosure to that minimally required to meet the level of service required of the HISP. Minimal use may require retention of data for security, audit, logging and other required operation; such use must be included in BAAs and service agreements, and must capture the minimal amount of data to fulfill those requirements. To the extent that HISPs support multiple functions with different requirements for data use, they must separate those functions such that more extensive data use or disclosure is not required for more basic exchange models. 9

Certificate Management Recommendations in the Direct Context Who should be the Trust Anchor for a community? Some entity must have the power to decide the criteria for which certificates are issued for the purpose of message exchange within their community -- PHRs, HIOs, distributed IDN, etc. Recommendation Post-Pilot for Direct Project Implementations Watch for the NwHIN Governance NPRM due out soon Contract with an entity that already has in place processes and procedures for validating conformance to governance policies and issuing certificates Communities that wish to exchange data with Federal providers and agencies must have certificates that chain to the Federal Bridge Certification Authority. 10

Certificate Management Recommendations in the Direct Context Organization or end-user certificates? Or both? Direct supports a model where certificates can be unique to individual addresses or the domain for the collective organization (hospital.com). Pilot Recommendation: Implementations may use organization-level certificates to minimize the complexity of provisioning and management. If participating organizations wish to use address specific certificates, take one of two approaches: Using new certificates for Direct issued by the community authority will simplify overall configuration (rather than re-use existing certificates) If the organization would like to issue new certificates for each endpoint, the community should make the organization a registration authority 11

Certificate Management Recommendations in the Direct Context What should be minimum identity-proofing and authorization requirements for providers and staff in a community? Hospital credentialing and authentication required to gain access to EHR systems or EHR modules often provide sufficient levels of assurance and authentication to issue certificates and private keys. In cases where such pre-existing methods do not exist, we recommend the following best practice for identity assurance for providers: Verify the place of practice, through means such as by contacting the practice or provider through independently sourced contact information (e.g., white or yellow pages directories) or through knowledge based methods Verify government issued IDs and licensure, including looking up licensure information in public registries Authentication standards may be addressed by NwHIN Governance NPRM 12

Direct Context Consumer Addresses PHRs have already begun to issue Direct compatible addresses Identity proofing: –By the provider, in person or equivalent –Or from a trusted PHR process –The consumer should provide his/her address to provider to initiate the linkage Authentication –Tiger Team leaning towards single-factor consumer authentication for provider portals; probably should also apply to PHR/Direct users? Watch for the NwHIN Governance NPRM 13

Certificate Management Recommendations in the Direct Context What should be the expiration policy for certificates? Policy should balance the value of regular refreshing of anchors and certificates with the operational burden of doing so. Pilot Recommendation: Eighteen months seems a reasonable expiration policy for anchors and certificates, with an intent to refresh after 12 months. 14

Q&A

Poll 16