Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 18, 2015.

Slides:



Advertisements
Similar presentations
Quality Measures Vendor Tiger Team January 30, 2014.
Advertisements

ELTSS Alignment to Nationwide Interoperability Roadmap DRAFT: For Stakeholder Consideration in response to public comment.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
NCVHS: Privacy and Confidentiality Leslie P. Francis, Ph.D., J.D. Distinguished Professor of Law and Philosophy Alfred C. Emery Professor of Law University.
Connecticut Ave NW, Washington, DC Understanding Patient Engagement in Stage 2 MU: Direct, HIPAA, VDT, and Patient Engagement.
NCVHS Panel 6 WEDI Testimony on Health Plan Identifier June 10, 2014 Laurie Darst, Mayo Clinic, Revenue Cycle Regulatory Advisor WEDI Board of Directors.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
1 Privacy and Security Tiger Team Meeting Discussion Materials Topics Patient Authentication Hearing Questions for RFC on Meaningful Use Stage 3 October.
Privacy and Security Workgroup October 14, 2014 Deven McGraw, chair Stan Crosley, co-chair.
Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair April 27, 2015.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 12, 2015.
MU Stage 3 Notice of Proposed Rulemaking (NPRM) Comments Privacy and Security Workgroup Deven McGraw, chair Stan Crosley, co-chair May 7, 2015.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Connecting Health and Care for the Nation: A Shared Nationwide Interoperability Roadmap – DRAFT Version 1.0 Joint FACA Meeting Chartese February 10, 2015.
Privacy and Security Workgroup: Big Data Public Hearing December 8, 2014 Deven McGraw, chair Stan Crosley, co-chair.
Privacy and Security Tiger Team Meeting Recommendations regarding a framework of security protections for EHRs December 7, 2011.
HIT Policy Committee Accountable Care Workgroup – Kickoff Meeting May 17, :00 – 2:00 PM Eastern.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair August 3,
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 22, 2015.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Update on Federal HIT Legislation Kirsten Beronio Mental Health America.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Larry Wolf, chair Marc Probst, co-chair Certification / Adoption Workgroup March 19, 2014.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
Office of the Secretary Office for Civil Rights (OCR) The HITECH NPRM: Overview of Research Comments October 19, 2010 Christina Heide, JD HHS Office for.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 12, 2015.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Draft – discussion only Advanced Health Models and Meaningful Use Workgroup June 23, 2015 Paul Tang, chair Joe Kimura, co-chair.
1 Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topics Governance RFI Prioritized Questions June 4, 2012.
The Paradox in HIPAA Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP December 8, 2014.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 18, 2013.
Larry Wolf Certification / Adoption Workgroup May 13th, 2014.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
Health Big Data Discussion Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair June 22, 2015.
The Internet of Things and Consumer Protection
Health Big Data Discussion Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair June 8, 2015.
Privacy and Security Tiger Team Trusted Identity of Patients in Cyberspace Initial Impressions on November 29 Hearing December 5, 2012.
Kickoff Meeting Josh Mandel, Co-Chair Meg Marshall, Co-Chair November 30, 2015 API Security Task Force.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
National Public Health Performance Standards Local Assessment Instrument Essential Service:6 Enforce Laws and Regulations that Protect Health and Ensure.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
API Task Force Josh Mandel, Co-Chair Meg Marshall, Co-Chair December 4, 2015.
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
Certification and Adoption Workgroup HIT Policy Committee April 28, 2014 Discussion on Incremental Rulemakings.
HIPAA Privacy Rule Positive Changes Affecting Hospitals’ Implementation of the Rule.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HIT Policy Committee Health Information Exchange Workgroup Comments on Notice of Proposed Rule Making (NPRM) and Interim Final Rule (IFR) Deven McGraw,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Regulatory Roundtable Meaningful Use & HIPAA Kathy Branca Ray Harms.
Update from the Faster Payments Task Force
Concerns of a Privacy Advocate – and How to Respond
Healthcare Privacy: The Perspective of a Privacy Advocate
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Notice of Proposed Rulemaking (NRPM) Comments Privacy and Security Workgroup Deven McGraw, Chair Stanley Crosley, Co-chair May 18, 2015

Agenda 1.Meaningful Use Stage 3 NPRM – Privacy and Security Issues Related to Increasing Patient Access to Data through either VDT or APIs 2.Return to Health Big Data 1

Privacy and security issues related to increasing patient access to data Risks/Provider Responsibility: – Heightened security risks from increasing numbers of APIs connecting to EHRs. – Vendors’ unclear or incorrect understanding and implementation of privacy and security legal requirements. – Vendors’ inadequate or incorrect implementation of entity’s privacy and security policies. 2 Risks/Patient Responsibility: – Use of app/device with weak security controls. – Use of app/device without privacy policy, or with unclear policy, or with policy that shares data liberally with third parties or allows broad uses.

Summary of Discussion The Workgroup supports the proposal to increase the opportunities for patient access to information through the use of VDT technologies as well as open APIs. However, the Workgroup has concerns about potential privacy and security risks associated with increasing patient access to health information electronically. The Workgroup recommends a mixture of timely, meaningful guidance for consumers, health care providers, and vendors, as well as a “certification” effort that facilitates differentiation of mobile tools that meet stakeholder needs with respect to privacy, security and usability. 3

1.ONC is already working with FTC and OCR to develop mobile health best practice guidance for developers which will eventually promote protection of user data. We urge the agencies to work quickly to widely disseminate this guidance so it can be useful for Stages 2 and 3 of MU. Such guidance should include: – Guidance for application developers on best practices for protecting privacy and security of information collected by the app and connecting with EHRs covered by HIPAA. 2.Additionally, we recommend development of guidance for patients/consumers and providers. Guidance should include: – Checklists for consumers on what to look for in a privacy/data use policy; – Mechanisms for consumers to compare privacy policies across apps (similar to ONC's model PHR notice)* 4 Recommendations * Personal Health Record (PHR) Model Privacy Notice. record-phr-model-privacy-noticehttp:// record-phr-model-privacy-notice

3.ONC and OCR should issue guidance addressing the intersection between the MU patient engagement objectives, the certification requirements, and HIPAA’s patient access rights. Such guidance also is needed to help providers in Stages 2 and 3 of MU. Issues include: – how to do a security risk assessment on patient app/device connections (such as through the API) and the extent to which a provider may reject a patient’s request for electronic access due to a perceived security risk for the provider; – the extent to which a provider may reject a patient’s request for electronic access in the absence of a security risk; – the ability of provider’s to charge fees for meaningful use access. 5 Recommendations (cont.)

3.The Health IT Policy Committee previously issued recommendations urging ONC and CMS to provide specific guidance to health care providers participating in MU and vendors of CEHRT to help them manage the risks of “view and download.’’* (see back-up slides) This guidance should be updated to also address risks of transmit and issued in time to assist providers (and CEHRT vendors) in responsibly making VDT and APIs available to patients as part of MU. Such guidance should address; –When liability for data shifts from provider to patient, and the extent to which patients are aware when they take responsibility for protecting data. –Best practices for counseling patients on assessing and managing privacy and security risks. –Responsibilities of vendors to include the CEHRT security safeguards in VDT and API modules. –Technical approaches vendors may take to further protect patients and providers (for example, ‘just in time’ notices before download and transmit that should be able to be turned off by the patient after the first notice and non-caching of data). –ONC also should act on prior recommendations on for guidance on identity proofing and authentication of patients, family members, friends and personal representatives. * 8/16/2011 HITPC Transmittal Letter. 6

4.Timely guidance is needed – but is not enough. We call for further exploration of a multistakeholder (including industry and patients) developed, voluntary certification program for patient-facing health apps. –The effort should address both privacy and security protections, as well as usability for consumers/patients. –The effort should leverage the guidance developed by federal government entities (see above). –Although the effort is voluntary, the FTC – under its existing FTCA authority, can enforce voluntary best practices for those who adopt. –The Consumer Empowerment Task Force (with assistance from the P&S Workgroup) should continue work to flesh out the details on this certification program, considering such issues as: –Whether it should include testing (similar to the CEHRT program). –What should be the role of ONC and other federal entities –Costs and potential impact on innovation 7 Recommendations (cont.)

PSWG Big Data Work plan 8 MeetingsTask  May 18, 2015 Recap: Presentation to the HITPC Review draft big data workplan Review draft big data report June 2, 2015 Begin reviewing draft strawman recommendations June 22, 2015 Continue reviewing strawman recommendations Finalize recommendations HITPC Meeting July 14, 2015 Goal: Present Health Big Data Findings

Big Data Recommendations 9 Submit recommendations to HITPC on July 14, 2015 Draft Table of Contents I.Executive Summary (Section 1) II.Background (Section 2) III.Scope (Section 3) IV.Expert Testimony (Section 4) V.Detailed Problem Statements (Section 5) VI.Solutions and Recommendations (Section 6) VII.Bibliography (Section 7)

Section V – Summary of the Problem Statements 10 § V. Problem Statement 1: Discriminatory Practices Describes the challenges of ensuring responsible use of data and the increasing risk of potential harms (e.g., discriminating against housing and employment, harms to dignity and harms to trust). Also it describes the issues in the lack of algorithmic transparency in how algorithms are used to make conclusions about individuals. § V. Problem Statement 2: Different Domains of Regulation (HIPAA vs. non-HIPAA) Yields Contradictions and Unpredictability Describes the challenges of having the two regulatory domains with their numerous requirements. Stakeholders are confused about what is required and what is not. Also it describes the challenges of having the limited HIPAA applicability and a growing number of NCEs which are collecting and using health-related data that are not required to comply with the HIPAA requirements. The issues of lack of education by individuals around how their data are used, as well as lack of control in accessing, using and sharing data are also described.

Section V – Summary of the Problem Statements 11 § V. Problem Statement 3: De-Identification and Re- Identification Describes the challenges of not having standards around de- identification methodologies. Also, describes the potential risk of re-identification while no enforcement exists to minimize/eliminate privacy risks. § V. Problem Statement 4: Security Threats and Gaps Describes the challenges of the inadequate security mechanisms in place within technology and the environment. Also, HIPAA is limited and NCEs are not required to meet the HIPAA security requirements.

Section VI – Draft Solutions and Recommendations 12 § VI. Solutions for Discriminatory Practices Call on effort that explores the following: Perform analysis of existing protections to identify gaps in law and regulation; identify areas for further inquiry; suggest further research to determine whether applicable legal models exist. Define harmful uses and identify controls on appropriate uses of health information. Identify approaches to dis-incentivize/punish malevolent behavior and incent benevolent uses of data. Improve trust through algorithmic transparency; disclose any use of open source algorithms; if an algorithm is proprietary, disclose a summary that identifies the creator, purpose, and general methodology.

Section VI – Draft Solutions and Recommendations 13 § VI. Solutions for Rebalancing Privacy Laws Rebalance laws in the following ways: – Congressional action: FIPPs-based protections for data outside of HIPAA. – Fix research rules for HIPAA and federally-funded research to make them more risk-based and do not create disincentives to research uses of data. – Improve patient access to data (both within HIPAA and as part of any legislation covering the non-HIPAA space).

Section VI – Draft Solutions and Recommendations 14 § VI. Solutions for Transparency Aim for greater transparency regarding actual uses of data for both identifiable and de-identified data. Update HIPAA and make part of comprehensive protections introduced for the non-HIPAA space. Develop and disseminate education to consumers about how data is used.

Section VI – Draft Solutions and Recommendations 15 § VI. Solutions for De-Identification and Re-Identification Risk Develop federally-approved standards for expert determination method for de-identification. Develop certification program to credential experts. Recommend change in law to prohibit re-identification or partial re-identification without objective oversight. ONC and OCR provide guidance on the following: Require re-assessment of re-identification risk upon certain events: e.g., data combined, expired, or other change in circumstances. Consider the use of Safe Harbor for low risk re-identification. Utilize contractual commitments to achieve greater accountability.

Section VI – Draft Solutions and Recommendations 16 § VI. Solutions for Security Threats Re-endorse prior Tiger Team recommendations* – Security policy for entities collecting, storing and sharing electronic health information needs to be responsive to innovation and changes in the marketplace. – Security policy needs to be flexible and scalable. – Providers need education and guidance on how to comply with security policy requirements. – HHS should have a consistent and dynamic process for updating security policies and rapid dissemination of new rules and guidance to all affected. Call on Congress for comprehensive legislation that includes security requirements. * 12/14/2011 HITPC Transmittal Letter.

17

Backup Slides 18

19 Offered flexibility of “best practices” for providers instead of a certification requirement or a “standard” Recommended that ONC share the guidance through REC and the entities certifying EHR technology Best Practices for Providers: Providers participating in the MU program should offer patients clear and simple guidance regarding use of the view and download in functionality in Stage 2. With respect to the “view” functionality, such guidance should address the potential risks of viewing information on a public computer, or viewing sensitive information on a screen that may be visible to others, or failing to properly log out after viewing. 8/16/2011 HITPC Transmittal Letter. Previous Recommendations on View and Download (Source: 8/16/2011 HITPC Transmittal Letter)

With respect to the “download” functionality, such guidance should be offered at the time the patient indicates a desire to download electronic health information and, at a minimum, address the following three items: 1.Remind patients that they will be in control of the copy of their medical information that they have downloaded and should take steps to protect this information in the same way that they protect other types of sensitive information. 2.Include a link or links to resources with more information on such topics as the download process and how the patient can best protect information after download. 3.Obtain independent confirmation that the patient wants to complete the download transaction or transactions. 20 Previous Recommendations on View and Download (Source: 8/16/2011 HITPC Transmittal Letter)

Providers should utilize techniques, if appropriate, that avoid or minimize the need for patients to receive repeat notices of the guidance on view and/or download risks. Providers should request vendors and software developers to configure the view and download functionality in a way that no cache copies are retained after the view session is terminated. Providers should request that their view and download functionality include the capability to automatically terminate the session after a period of inactivity. 21 Previous Recommendations on View and Download (Source: 8/16/2011 HITPC Transmittal Letter)

ONC should also provide the above guidance to vendors and software developers, such as through entities conducting EHR certification. Providers can review the Markle Foundation policy brief, and the guidance provided to patients as part of the MyHealtheVet Blue Button and Medicare Blue Button, for examples of guidance provided to patients using view and download capabilities. 22