HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
TM The HIPAA Privacy Rule: Safeguarding Health Information in Research and Public Health Practice Centers for Disease Control and Prevention Beverly A.
Reviewing the World of HIPAA Stephanie Anderson, CPC October 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
HIPAA Privacy Rule Patient’s Right to Amend Their Health Information July 18, 2013 David Holtzman, JD, CIPP/G Senior Health Information Technology & Privacy.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
1 Privacy and Security Tiger Team Meeting Discussion Materials Topics Patient Authentication Hearing Questions for RFC on Meaningful Use Stage 3 October.
Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair April 27, 2015.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Privacy and Security in the Direct Context Session 6 April 12, 2010.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
HIPAA Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair Provider Authentication Recommendations November 19, 2010.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Privacy and Security Tiger Team Trusted Identity of Providers in Cyberspace Follow-Up Recommendations September 6, 2012.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
HIT Policy Committee Privacy & Security Tiger Team Update Deven McGraw, Co-Chair Center for Democracy & Technology Paul Egerman, Co-Chair June 25, 2010.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Privacy and Security Tiger Team Trusted Identity of Patients in Cyberspace Initial Impressions on November 29 Hearing December 5, 2012.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HIT Standards Committee Privacy and Security Workgroup Standards and Certification Requirements for Certified EHR Modules Dixie Baker, Chair Walter Suarez,
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
HIPAA Guidance API Security Task Force February 22, 2016 Office for Civil Rights 1.
HIPAA TRIVIA QUEST December Edition. I’ll ask the questions - and you’ll give the answers.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
HIPAA Security Standards Final Rule
HIPAA Privacy and Security Update - 5 Years After Implementation
Presentation transcript:

HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team and HITSC Privacy and Security Workgroup Dixie Baker, P&S Workgroup Chair December 19, 2012

Hearing Focus Identity Proofing of Consumers Authentication of Consumers Stage 2 meaningful use takes a significant step forward in empowering patients to play an active role as part of their own health care team. Specifically, Stage 2 incorporates the HITECH provisions for patients to be able to view, download, and forward to a third party an electronic copy of their health information. Thus for Stage 2, identity proofing and authentication of consumers become very, very important.

Definition: Identity Proofing Identity Proofing is the process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be –May include, for example, driver license, passport, birth certificate –Identity proofing is performed before the account is created (e.g., portal, ), the credential is issued (e.g., digital certificate) or the special privilege is granted

Definition: Authentication Authentication is the process of establishing confidence that an individual who uses a credential that is known to the system (e.g., login name, digital certificate) is indeed the person to whom the credential was issued –Three types of authenticators: Something you know (e.g., password) Something you have (e.g., smartcard, hard token, mobile phone) Something you are (e.g., fingerprint) –Multi-factor authentication requires more than one type –Authentication is performed each time a user logs into an account (e.g., portal, ) or otherwise uses a credential

Purposes of Hearing Aiming toward “best practices” for meaningful-use Stage 2 and forward-looking practices for Stage 3 Recommendations –Principles –Best practices –Transmit functions for consumer communications Privacy and Security Tiger Team will present policy recommendations to HIT Policy Committee in January

Hearing Agenda Introductions from TT/WG Chairs and ONC HIPAA Privacy and Security Rule Requirements for Verification of Identity (David Holtzman, HHS Office for Civil Rights)* Panel One: Why identity proofing and authentication of patients are important and what are the key issues. Panel Two: What patient identity proofing and authentication methods are in use now. Panel Three: What identity proofing and authentication solutions are on the horizon. *ONC summary of relevant HIPAA requirements included in Appendix

Principles Gleaned from Hearing Want ID proofing and authentication to be protective and easy to use Need flexible solutions Patients need to be educated on risks and protection that ID proofing and authentication give them Want patients to be able to have an identity that can be used by multiple providers Solutions need to evolve over time

Identity Proofing Methods In person –Performed by provider where relationship/trust exists; training of provider employees on basics of identity proofing needed –Some use methods that rely on third parties (such as notaries public) Remote –Reuse of existing credentials –Third-party, knowledge-based Dependent on quality of data, questions; may be expensive May not address all patients, for example, minors <18 Patient education critical to address privacy concerns –Demographic matching on practice management or other provider systems –Should be accompanied by out-of-band confirmation (e.g., letter) Need to share “best practices”

Authentication Methods Tiger Team/HITPC previously recommended a minimum of user name and password Questioned whether a higher level of assurance was needed –No single level of assurance is right for all purposes –Need “best practices” that move in the same direction as online banking –Need transparency regarding risks and benefits for download and transmit Need to move toward National Strategy for Trusted Identities in Cyberspace (NSTIC) approach

Privacy and Security Workgroup Observations Capitalize on banking industry guidelines Define level of assurance required, not how to be accomplished Should not attempt to align provider and consumer methods for ID proofing and authentication – need higher level of assurance for providers than for patients Best to establish best practices for ID proofing and standard for authentication Deven McGraw (Chair Privacy and Security Tiger Team) met with Workgroup to discuss hearing. These are some of the observations gleaned from that discussion.

Transmitting to Consumers and Third Parties 2014 Edition of Standards and Certification Criteria require capability to use Direct to transmit health information to patients and third parties –CMS has made clear that transmission using transport standards other than Direct (SMTP, FTP, REST, SOAP, etc.) will still count toward the patient-action (5%) measure HIT Policy Committee has raised questions regarding the use of Direct for transmissions to consumers, given perceived complexities associated with the issuance, use, and management of digital certificates –Anticipate that PHR service providers will provide Direct addresses, and associated digital certificates, to consumers –As a measure of identity proofing, providers will need to obtain Direct address directly from patient requesting record transmission

Next Step Privacy and Security Tiger Team will present findings and recommendations on identity proofing and authentication to HIT Policy Committee in January

Backup slides Appendix: OCR Summary of Relevant HIPAA Requirements

Overview of the Verification Requirements of the HIPAA Privacy and Security Rules David S. Holtzman, JD, CIPP/G Office for Civil Rights Health Information Privacy Division

Privacy Rule Verification Standard The Privacy Rule (45 CFR (h)) requires covered entities (CE) to verify the identity and authority of a person requesting protected health information (PHI), if not known to the CE. The Rule allows for verification in most instances in either oral or written form, although verification does require written documentation when such documentation is a condition of the disclosure. The Rule generally does not include specific or technical verification requirements to permit covered entities to fashion procedures that fit the size and complexity of their organization. The CE must also establish and document procedures for verification of identity and authority of personal representatives, if not known to the entity.

Implementing the Privacy Rule’s Verification Standard For example, verification procedures that can be applied in an electronic health information environment: Consumers can agree with the CE to keep current their demographic information and personal representatives so the CE can appropriately authenticate each user of the network For persons claiming to be government officials, proof of government status may be provided by having a legitimate government extension (e.g., xxx.gov) Documentation requiring signatures may be provided as a scanned image of the signed documentation or as an electronic document with an electronic signature, to the extent the electronic signature is valid under applicable law.

Security Rule Verification Standards The Security Rule layers additional safeguards for the verification of identity when attempting to access electronic protected health information (e-PHI). The information access management standard (45 CFR (a)(4)(i)) requires a covered entity or their business associate to have formal, documented policies and procedures implemented for the authorization of access to e-PHI that are complimentary with those of the Privacy Rule. The person or entity authentication standard (45 CFR (d)) requires a covered entity to implement procedures or security measures to verify that a person or entity seeking access to e-PHI is the one claimed.