Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair April 21, 2015.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Quality Measures Vendor Tiger Team January 30, 2014.
HITSC Clinical Quality Workgroup Jim Walker March 27, 2012.
2014 Edition Release 2 EHR Certification Criteria Final Rule.
Clinical Documentation Architecture (CDA) S&I Framework One-Pager Series, Side 1 Background CDA is an XML-based standard prescribed by HL7 that specifies.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Electronic Submission of Medical Documentation (esMD) for Medicare FFS Presentation to HITSC Provenance Workgroup January 16, 2015.
Timeline & Milestones: Certification & Standards NPRM Stage 2 Health IT Standards Committee, March 29, 2011 Doug Fridsma, MD, PhD Director Office of Interoperability.
Project Proposal to IHE: Implementation Guide for Data Segmentation For Privacy (DS4P) over REST Submitted by S&I Framework Data Segmentation for Privacy.
Interoperability Roadmap Comments Package Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair February 24, 2015.
S&I Framework Laboratory Initiatives Update June 6, 2013.
Certification NPRM Comments Package Transport and Security Standards Workgroup Dixie Baker, Chair Lisa Gallagher, Co-Chair May 20, 2015.
Transport & Security Standards Workgroup Notice of Proposed Rulemaking Dixie Baker, chair Lisa Gallagher, co-chair April 8, 2015.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Interoperability and Health Information Exchange Workgroup March 10, 2015 Micky Tripathi, chair Chris Lehmann, co-chair.
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair May 6, 2015.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Final Recommendations Data Provenance Task Force Lisa Gallagher, HIMSS, Chair January 27, 2015.
Working Meeting Data Provenance Task Force Lisa Gallagher, Chair January 23, 2015.
2015 Edition Certification NPRM HPD Group Report Out May 7, 2015 Architecture, Services, and APIs Arien Malec, co-chair David McCallie, co-chair.
Quality Measurement Task Force Summary Deck 2016 Inpatient Prospective Payment System June 15, 2015 Cheryl Damberg, Co-Chair Kathleen Blake, Co-Chair.
S&I Data Provenance Initiative Questions for the HITSC on the S&I Data Provenance Initiative November 18, 2014 Julie Anne Chua, PMP, CAP, CISSP Office.
2015 Edition Certification NPRM Standards Prioritization June 24, 2015 Content Standards Workgroup Andy Wiesenthal, chair Rich Elmore, co-chair.
S&I Framework Doug Fridsma, MD, PhD Director, Office of Standards and Interoperability, ONC Fall 2011 Face-to-Face.
August 12, Meaningful Use *** UDOH Informatics Brown Bag Robert T Rolfs, MD, MPH.
EsMD Background Phase I of esMD was implemented in September of It enabled Providers to send Medical Documentation electronically Review Contractor.
Electronic Submission of Medical Documentation (esMD) Face to Face Informational Session Charter Discussion – 9:30am – 10:00am October 18, 2011.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair May 15, 2015.
1 © Health Level Seven International ®, Inc. All Rights Reserved. HL7 International and Health Level Seven International are registered trademarks.
HIT Standards Committee Privacy and Security Workgroup Dixie Baker, Chair Walter Suarez, Co-Chair June 22, 2011.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy & Security Workgroup NPRM Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair April 24, 2014.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Draft – discussion only Content Standards WG (Documents and Data) Proposed HITSC Workgroup Evolution 1 Architecture, Services & APIs WG Transport and Security.
Quality Measurement Task Force 2016 Inpatient Prospective Payment System June 30, 2015 Cheryl Damberg, Co-Chair Kathleen Blake, Co-Chair.
Larry Wolf, chair Marc Probst, co-chair Certification / Adoption Workgroup March 19, 2014.
EHR-S Functional Requirements IG: Lab Results Interface Laboratory Initiative.
Data Segmentation for Privacy Agenda All-hands Workgroup Meeting May 9, 2012.
Larry Wolf, chair Marc Probst, co-chair Certification / Adoption Workgroup February 21, 2014.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Larry Wolf, chair Marc Probst, co-chair Certification / Adoption Workgroup March 6, 2014.
Structured Data Capture (SDC) UCR to Standards Crosswalk Analysis July 11, 2013.
2016 Interoperability Standards Advisory Draft for comment Steve Posnack Director Office of Standards and Technology, ONC 1.
Larry Wolf Certification / Adoption Workgroup May 13th, 2014.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
HIT Standards Committee Overview and Progress Report March 17, 2010.
S&I Public Health Education Series: Data Provenance July 9th, 2014 Johnathan Coleman Initiative Coordinator – Data Provenance ONC/OCPO/OST (CTR)
Structured Data Capture (SDC) Gap Mitigation July 18, 2013.
Draft Provider Directory Recommendations Begin Deliberations re Query for Patient Record NwHIN Power Team July 10, 2014.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
HIT Standards Committee Privacy and Security Workgroup Standards and Certification Requirements for Certified EHR Modules Dixie Baker, Chair Walter Suarez,
Standards & Interoperability (S&I) Structured Data Capture (SDC) FHIR Profile IG SWG.
Larry Wolf Certification & Adoption Workgroup Recommendations on LTPAC/BH EHR Certification May 6, 2014.
HIT Standards Committee Privacy and Security Workgroup Task Update: Standards and Certification Criteria for Certifying EHR Modules Dixie Baker, Chair.
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
Certification and Adoption Workgroup HIT Policy Committee April 28, 2014 Discussion on Incremental Rulemakings.
Clinical Quality Workgroup April 10, 2014 Commenting on the ONC Voluntary 2015 Edition Proposed Rule Marjorie Rallins– co-chair Danny Rosenthal –co-chair.
2015 Edition Certification NPRM Non API Group Report Out May 5, 2015 Architecture, Services, and APIs Arien Malec, co-chair David McCallie, co-chair.
Data Provenance All Hands Community Meeting February 19, 2015.
HIT Standards Committee NwHIN Power Team Dixie Baker, Chair July 20,
Clinical Documentation Hearing Recommendations Meaningful Use and Certification and Adoption Workgroups Paul Tang, MU Workgroup Chair Larry Wolf, C&A Workgroup.
Working Meeting Data Provenance Task Force Lisa Gallagher, Chair January 16, 2015.
Project Proposal to IHE IHE ITI Representational State Transfer (REST) Transport Implementation Guide for Data Segmentation for Privacy (DS4P) Submitted.
US Core Data for Interoperability (USCDI): Data Provenance IG
Presentation transcript:

Transport & Security Standards Workgroup Notice of Proposed Rulemaking Comments Dixie Baker, Chair Lisa Gallagher, Co-Chair April 21, 2015

TopicTime Allotted Review of NPRM Comments from April 8 th Meeting30 minutes Workgroup Discussion: NPRM Comments C-CDA Data Provenance Auditable Events and Tamper-Resistance (time permitting) 50 minutes Public Comment5 minutes Agenda 2

MeetingNPRM AssignmentsRule & Reference (Public inspection version) April 8, :00pm-4:30pm ET Health IT Module Certification Requirements: Privacy & Security pp & Appendix A Automatic Access Time-Out § (d)(5): pp End-User Device Encryption § (d)(7): pp Integrity § (d)(8): pp April 21, 2015 (Tues) 3:00pm-4:30pm ET C-CDA Data Provenance pp , Auditable Events and Tamper-Resistance § (d)(2): pp , May 6, :00pm-4:30pm ET Data Segmentation for Privacy – Send/Receive § (b)(7)/ § (b)(8) pp , 390 Electronic Submission of Medical Documentation § (j)(1): pp NPRM Assignments & Workplan (HITSC – NPRM Comments Due May 20) We are here 3

Review of NPRM Comments from April 8 th Meeting 4

NPRM April 8 th Meeting Topics Health IT Module Certification Requirements: Privacy & Security – Assignment: John Hummel End-User Device Encryption – Assignment: Aaron Miri Automatic Access Time-Out Integrity 5

Health IT Module Certification Requirements: Privacy & Security Security certification criteria – Section (d) (1) Authentication, access control and authorization (2) Auditable events and tamper-resistance (3) Audit reports (4) Amendments (5) Automatic access time-out (6) Emergency access (7) End-user device encryption (8) Integrity

Security Applicability Table Excludes (8) integrity. Is this an oversight? Excludes (4) amendments only. OK? Excludes all of (g) Design & Performance. This section includes Application Access to Common Clinical Data Set, but it is not context-specific, and it includes its own security criteria. OK?

End-User Device Encryption Passwords – Org. flexibility; 2fx authentication; PW length; market development around PW strength Encryption keys – Organizational policies driven by risk assessment – Focus: capability to change keys v. frequency – Flexibility: data at rest (SAN layer / layer 1) v. application layer

Workgroup Discussion: NPRM Comments CCDA Data Provenance Auditable Events and Tamper-Resistance (time permitting) 9

2010 President’s Council of Advisors on Science and Technology (PCAST) Report “Realizing the Full Potential of Health Information Technology to Improve Healthcare for Americans”* 2014 Standards and Interoperability (S&I) Framework** 2014 HL7 IG for CDA Release 2: Data Provenance and Release 1 (US Realm) (DSTU)*** 2014 S&I Framework 2014 HL PCAST Report *PCAST Report **S&I Framework ***HL7 IG for CDA Release 2 andhttp://wiki.hl7.org/index.php?title=HL7_Data_Provenance_Project_Space Release 1 DSTU C-CDA Data Provenance: 2010 –

The HL7 IG for CDA Release 2: Data Provenance, Release 1 (US Realm) standard was published as a DSTU for the September 2014 ballot.* The S&I Data Provenance Community identified 11 different standards**, just within HL7, that may describe provenance related requirements or events. Most of these are normative, final standards (such as the CDA itself). The S&I project therefore proposed this standard be developed, with the goal of building on provenance related requirements from existing standards, and compiling them into a single standard which can be used as an “overlay” to address provenance for the CDA. 11 HL7 IG for CDA Release 2: Data Provenance, Release 1 (US Realm) Maturity * **

The HL7 IG for CDA R2: Data Provenance DSTU standard is an Implementation Guide, and contains templates describing conformance for different types of provenance events such as: – “Assembling” existing data into a new artifact, based on a predetermined algorithm – “Composing” derivative information from a subset of the available information (choosing / selecting certain things to include) The HL7 CDA DPROV IG will be able to be used with existing standards to help ensure the data elements being transmitted are constrained to ensure provenance information is captured. 12 HL7 IG for CDA Release 2: Data Provenance, Release 1 (US Realm) Appropriateness

The HL7 DPROV IG may be useful in addressing the challenge of identifying where the multiple sources of information originally came from – such as VDT information provided to a patient. – For example, a provider may have used information from multiple sources (personal fitness device, consult, etc.,) to compose something new, which is then made available through VDT. – It would be useful for subsequent receivers of that information (e.g. another provider receiving it through ToC) to know what the sources of the original data were (e.g. the personal fitness device), rather than just “this came to me from a provider”. The HL7 DPROV IG will increase traceability to original sources of data by utilizing capabilities in existing standards. 13 HL7 IG for CDA Release 2: Data Provenance, Release 1 (US Realm) Usefulness

C-CDA Data Provenance ONC seeks comment on the following: – Maturity and appropriateness of HL7 IG for the tagging of health information with provenance metadata in connection with C-CDA – Usefulness of the HL7 IG in connection with certification criteria, such as ToC and VDT certification criteria 14

Workgroup Discussion: NPRM Comments CCDA Data Provenance Auditable Events and Tamper-Resistance (time permitting) 15

Auditable Events and Tamper-Resistance NPRM proposes no change to “auditable events and tamper-resistance” criterion, but seeks comment on the following: – Modify/Add auditing standard to require change of user privileges to be audited; any recommended standards to use – Whether a critical subset of auditable events should remain enabled at all times (Specific questions on following slides) 16

Change in user privileges: ONC seeks comment on: – Whether ONC must explicitly modify/add to the overall auditing standard […] to require change of privileges to be audited or if this event is already audited at the point of authentication – Any recommended standards to be used in order to record these additional data elements Auditable Events and Tamper-Resistance 17

Critical Subset of Auditable Events: ONC seeks comments on : – Whether there is a critical subset of auditable events that ONC should require remain enabled at all times, and if so, additional information regarding which events should be considered critical and why – Whether there is any alternative approach that ONC could or should consider – Whether any negative consequences may arise from keeping a subset of audit log functionality enabled at all times Auditable Events and Tamper-Resistance 18

Workgroup Discussion: Topics For May 6 Data Segmentation for Privacy (DS4P) Electronic Submission of Medical Documentation (esMD) Next Set of NPRM Topics 19

Back Up Slides 20

C-CDA Data Provenance Data Provenance Task Force – January 2015 brief to HITSC Question presented: – Given the community-developed S&I Data Provenance Use Case, what first step in the area of data provenance standardization would be the most broadly applicable and immediately useful to the industry? Question 3: Are there any architecture or technology specific issues for the community to consider: – Content: Refining provenance capabilities for CDA/C-CDA while supporting FHIR? – Consider related work in HL7 projects: CDA/C-CDA provenance, FHIR Provenance Project, Privacy on FHIR Projects 21

Auditable Events and Tamper-Resistance : 2013 – report entitled “ Not All Recommended Safeguards Have Been Implemented in Hospital EHR Technology (OEI )* Keep audit log operational during updates or viewing HHS Office of Inspector General (OIG) released a report entitled “The Office of the National Coordinator for Health Information Technology’s Oversight of the Testing and Certification of Electronic Health Records.”** Failure to address logging emergency access or user privilege changes 2014 HHS OIG 2013 HHS OIG *2013 HHS OIG Report ** 2014 HHS OIG Report 22

Auditable Events and Tamper-Resistance : 2013 – 2015 Continued 2014 Edition “auditable events and tamper-resistance” certification criterion requires that health IT technology must be able to record additions, deletions, changes, queries, print, copy, and access. NPRM proposes to adopt a 2015 Edition “auditable events and tamper-resistance” certification criterion that is unchanged re: the 2014 Edition (§ (d)(2)), but seeks comment on two issues – user permissions and critical auditable events 2015 NPRM 2014 NPRM 23

2015 Edition Health IT Certification Criterion: (2) Auditable events and tamper-resistance (i)Record actions. Technology must be able to: (A) Record actions related to electronic health information in accordance with the standard specified in § (e)(1); (B) Record the audit log status (enabled or disabled) in accordance with the standard specified in § (e)(2) unless it cannot be disabled by any user; and (C) Record the encryption status (enabled or disabled) of electronic health information locally stored on end-user devices by technology in accordance with the standard specified in § (e)(3) unless the technology prevents electronic health information from being locally stored on end-user devices (see paragraph (d)(7) of this section). (ii) Default setting. Technology must be set by default to perform the capabilities specified in paragraph (d)(2)(i)(A) of this section and, where applicable, paragraph (d)(2)(i)(B) or (C) of this section, or both paragraphs (d)(2)(i)(B) and (C). (iii) When disabling the audit log is permitted. For each capability specified in paragraphs (d)(2)(i)(A) through (C) of this section that technology permits to be disabled, the ability to do so must be restricted to a limited set of users. (iv) Audit log protection. Actions and statuses recorded in accordance with paragraph (d)(2)(i) of this section must not be capable of being changed, overwritten, or deleted by the technology. (v) Detection. Technology must be able to detect whether the audit log has been altered. Proposed: Auditable Events and Tamper-Resistance 24