September, 2005What IHE Delivers 1 Basic Patient Privacy Consents IHE Educational Workshop 2007 John Moehrke GE Healthcare Lori Fourquet e-HealthSign LLC.

Slides:



Advertisements
Similar presentations
September, 2005What IHE Delivers 1 Key Image Notes Evidence Documents Simple Image & Numeric Report Access to Radiology Information IHE Vendors Workshop.
Advertisements

September, 2011What IHE Delivers Cross-enterprise Workflow Management (XDW profile) IT Infrastructure Planning Committee Luca Zalunardo, Arianna Cocchiglia.
What IHE Delivers Basic Patient Privacy Consents HIT-Standards – Privacy & Security Workgroup John Moehrke GE Healthcare.
September, 2005What IHE Delivers 1 Implementing IHE in Regional Health Information Networks IHE Europe Changing the Way Healthcare Connects IHE.
September, 2005What IHE Delivers 1 Basic Patient Privacy Consents (BPPC) IHE Vendors Workshop 2006 IHE Patient Care Coordination Education
September, 2005What IHE Delivers 1 Presenters: Keith W. Boone, John Donnelly, Larry McKnight, Dan Russler IHE Patient Care Coordination.
XDS Security ITI Technical Committee May 27, 2006.
June 28-29, 2005IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Cross-enterprise Document Sharing for Imaging (XDS-I) Rita Noumeir.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Are you ready for HIPPO??? Welcome to HIPAA
Cross-Enterprise Document Sharing Cross-Enterprise Document Sharing Bill Majurski National Institute of Standards and Technology IT Infrastructure Co-Chair.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Slide 1 Sharing Images without CDs, The Next Imaging Sea Change GE Healthcare Chris Lindop GE Healthcare Interoperability & Standards.
Distributing Images: Cross-enterprise Document Sharing for Imaging (XDS-I) Access to Radiology Information (ARI) Retrieve Information for Display (RID)
Consumer Privacy using HITSP TP30 John Moehrke – GE Healthcare Co-Chair HITSP Security/Privacy/Infrastructure Co-Chair HL7 Security Workgroup Member IHE.
Cross Domain Patient Identity Management Eric Heflin Dir of Standards and Interoperability/Medicity.
1 Charles Parisot, GE Healthcare IHE IT Infrastructure Planning Committee Co-chair IHE Update to DICOM.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
IHE Radiology –2007What IHE Delivers 1 Christoph Dickmann IHE Technical Committee March 2007 Cross Domain Review PCC.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
IHE QRPH Maternal and Child Health IHE Webinar Series Lori Fourquet e-HealthSign LLC.
Patient Care Coordination Tone Southerland Greenway Medical Technologies Co-chair, IHE PCC Marcia Veenstra Senior Health Inc. Co-chair, IHE PCC Nursing.
September, 2005What IHE Delivers 1 Presenters: Keith W. Boone, John Donnelly, Larry McKnight, Dan Russler IHE Patient Care Coordination.
What IHE Delivers Security and Privacy Overview & BPPC September 23, Chris Lindop – IHE Australia July 2011.
Publication and Discovery XDS IHE IT Infrastructure Webinar Series.
XDS Security ITI Technical Committee May 26, 2006.
Cross-Enterprise User Assertion IHE Educational Workshop 2007 Cross-Enterprise User Assertion IHE Educational Workshop 2007 John F. Moehrke GE Healthcare.
September, 2005What IHE Delivers 1 Key Image Notes Evidence Documents Simple Image & Numeric Report Access to Radiology Information IHE Vendors Workshop.
September, 2005What IHE Delivers 1 Patient Care Coordination IHE Europe Workshop 2007 IHE Patient Care Coordination Charles Parisot, GE Healthcare.
This material was developed by Duke University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information.
IHE Radiology –2007What IHE Delivers 1 Ellie Avraham IHE Technical Committee May 23, 2007 Cross Domain Review Laboratory.
IHE CDA Templates HL7 UK 2007 Keith W. Boone Interoperability Architect, GE Healthcare Co-chair, IHE Patient Care Coordination TC Co-chair, HL7 Structured.
September, 2005What IHE Delivers Content Integration Profiles Ana ESTELRICH, GIP-DMP, FRANCE Charles PARISOT, GE Grateful thanks to Charles Parisot, Keith.
September, 2005What IHE Delivers 1 IT Infrastructure Planning Committee Chris Kenworthy - Siemens XDM / XDR Point-to-Point Push of Documents.
November, 2012What IHE Delivers XDW (Cross-Enterprise Document Workflow) & XBeR-WD (Cross-Enterprise Basic eReferral Workflow Definition) Workflow Management.
Sharing Value Sets (SVS Profile) Ana Estelrich GIP-DMP.
Data Segmentation for Privacy Agenda All-hands Workgroup Meeting May 9, 2012.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise HIMSS Demonstration XDS Document Content Specifications Keith W.
Dynamic Document Sharing Detailed Profile Proposal for 2010 presented to the IT Infrastructure Technical Committee Karen Witting November 10, 2009.
Key Issues of Interoperability in eHealth Asuman Dogac, Marco Eichelberg, Tuncay Namli, Ozgur Kilic, Gokce B. Laleci IST RIDE Project.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Education Workshop 2007 IHE IT Infrastructure Education John Moehrke GE Healthcare.
IHE IT Infrastructure Domain Update Karen Witting – IBM IT Infrastructure Planning Committee co- chair.
Working with HIT Systems
September, 2005Cardio - June 2007 IHE for Regional Health Information Networks Cardiology Uses.
1 Healthcare Information Technology Standards Panel Care Delivery - IS01 Electronic Health Record (EHR) Laboratory Results Reporting July 6, 2007.
Cross-Enterprise User Authentication John F. Moehrke GE Healthcare IT Infrastructure Technical Committee.
September, 2005What IHE Delivers 1 Patient Care Coordination IHE Workshop 2006 IHE Patient Care Coordination Education Keith W Boone, John Donnelly, Larry.
XDS Security ITI Technical Committee May 27, 2006.
1 IHE ITI White Paper on Authorization Rough Cut Implementation Opportunities for BPPC Dr. Jörg Caumanns, Raik Kuhlisch, Olaf Rode Berlin,
Networking and Health Information Exchange Unit 6a EHR Functional Model Standards.
September, 2005What IHE Delivers 1 Presenters Scanned Documents.
IHE IT Infrastructure Domain Update Karen Witting – IBM IT Infrastructure Technical Committee co-chair.
Dynamic/Deferred Document Sharing (D3S) Profile for 2010 presented to the IT Infrastructure Technical Committee Karen Witting February 1, 2010.
Cross-Enterprise User Authentication Year 2 March 16, 2006 Cross-Enterprise User Authentication Year 2 March 16, 2006 John F. Moehrke GE Healthcare IT.
September, 2005What IHE Delivers 1 Basic Patient Privacy Consents IHE Educational Workshop 2007 John Moehrke Lori Forquet.
September, 2005What IHE Delivers 1 Basic Patient Privacy Consents IHE Educational Workshop 2007 John Moehrke GE Healthcare Lori Fourquet e-HealthSign LLC.
What IHE Delivers Basic Patient Privacy Consents HIT-Standards – Privacy & Security Workgroup John Moehrke GE Healthcare.
September, 2005What IHE Delivers 1 Sarah Knoop XDS-SD Scanned Documents.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
XDS Security ITI Technical Committee May, XDS Security Use Cases Prevent Indiscriminate attacks (worms, DOS) Normal Patient that accepts XDS participation.
The Patient Choice Technical Project Dataset Considerations Candidate Standards Mapping Companion Document April 12 th, 2016.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Case Study: HL7 Conformance in VA Imaging Mike Henderson Principal Consultant Eastern Informatics, Inc.
Dynamic/Deferred Document Sharing (D3S) Profile for 2010 presented to the IT Infrastructure Technical Committee Karen Witting February 1, 2010.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
IT Infrastructure Plans
IHE Security XDS as a case study
Patient Care Coordination
Presentation transcript:

September, 2005What IHE Delivers 1 Basic Patient Privacy Consents IHE Educational Workshop 2007 John Moehrke GE Healthcare Lori Fourquet e-HealthSign LLC

2 Basic Patient Privacy Consents XDS-MS Medical Documents Medical Summaries Referral Discharge Summary BCCP Consent EDR Emergency Department Referral PPHP Preprocedure History and Physical History and Physical XPHR PHR Update XDS-LAB Lab Report PHR Extract BCCP Consent

3 What do Standards Define? Policy  Driven by business goals  Informed by Risk Assessments  Defines rights and responsibilities  Defines punishment Process  Enforces policy  How people or organizations act  who / what / where / when / how Technology  Enforces policy  How equipment should act  Algorithms and data formats Policy Process Technology

4 Before One Policy for the Affinity Domain Patient doesn’t agree  Don’t publish VIP Patient  Don’t publish Sensitive Data  Don’t publish Research Use  No Access

5 Basic Patient Privacy Consents Small number of pre-coordinated Affinity Domain Privacy Consent  Patient can choose which ones to agree to Data is classified and published under the authority of a specific Privacy Consent Data is used in conformance with original Privacy Consent Applicable for XD* mechanism

6 Abstract The Basic Patient Privacy Consents (BPPC) profile provide mechanisms to:  Record the patient privacy consent(s),  Mark documents published to XDS/XDR/XDM with the patient privacy consent(s) that was used to authorize the publication,  Enforce the privacy consent(s) appropriate to the use.

7 XD* OPTIONS XDS Document Source XDS Document Consumer XDR Document Source XDR Document Recipient XDM Document Sources XDM Document Receivers Nothing new for XDS Registry and Repository

8 Key Technical Properties Human Readable Machine Processable Supports standards-based Access Controls Multiple Consent Types and Documents (e.g., HIPAA)  Opt-in or Opt-out  Implicit or Explicit  Time Limited Wet Signature Capture (i.e. XDS-SD) Digital Signature Capture Possible (i.e. DSG)  Provider, Witness, Patient or Legal Representative Extensible

9 Value Proposition An Affinity Domain (RHIO, HIE)  develop a set of privacy policies,  and implement them with role-based or other access control mechanisms supported by EHR systems. A patient can  Be made aware of the privacy policies.  Have an opportunity to selectively control access to their healthcare information.

10 Standards and Profiles Used CDA Release 2.0 XDS Scanned Documents Document Digital Signature Cross Enterprise Document Sharing Cross Enterprise Sharing on Media Cross Enterprise Sharing with Reliable Messaging

11 Informed by Privacy Policy Standards ISO IS22857 Trans-border Flow of Health Information ISO TS Privilege Management and Access Control (Parts 1, 2, draft 3) ASTM E1986 Standard Guide for Information Access Privileges to Health Information

September, 2005What IHE Delivers 12 Deeper Dive

13 Value Proposition An Affinity Domain (RHIO, HIE)  develop a set of privacy policies. For Example: No HIE use allowed (e.g. Opt-Out) No HIE use allowed (e.g. Opt-Out) All clinical use (e.g. Opt-In) All clinical use (e.g. Opt-In) Restricted to Assigned Clinician + Emergency Mode Restricted to Assigned Clinician + Emergency Mode Emergency Data Set Emergency Data Set De-Identified document De-Identified document  Each policy is given a number (OID)  implement them with role-based or other access control mechanisms supported by EHR systems.

14 Capturing the Patient Consent act One of the Affinity Domain Consent policies CDA document captures the act of signing  Effective time (Start and Sunset)  templateID – BPPC document  XDS-SD – Capture of wet signature from paper  DSIG – Digital Signature (Patient, Guardian, Clerk,System) XDS Metadata  classCode – BPPC document  eventCodeList – the list of the identifiers of the AF policies  confidentialityCode – could mark this document as sensitive

15 Scanned Document details Privacy Consent details Policy S S t t r r u u c c t t u u r r e e d d C C o o n n t t e e n n t t w w i i t t h h c c o o d d e e d d s s e e c c t t i i o o n n s s : : Structured and Coded CDA Header Time of Service, etc. Base64 encoded XDS-MS + XDS-BPPC + XDS-SD Patient, Author, Authenticator, Institution, XDS Metadata: Consent Document Digital Signature IHE-DSG – Digital Signature Signature value Pointer to Consent document Consent document

16 Marking all XDS Documents Use Affinity Domain well formed vocabulary Indicated in XDS Metadata – confidentialityCode  List of appropriate-use consents  OR logic Registry rejects non-conformant confidentialityCodes Affinity Domain Policy must indicate rules for publishing documents with codes for which the patient has not specifically consented to.

17 Using documents XDS Registry Stored Query Transaction  Consumer may request documents with specific policies  Filtered response XDS Consumer Actor  Informed about confidentialityCodes -- Metadata  Knows the user, patient, setting, intention, urgency, etc.  Enforces Access Controls (RBAC) according to confidentiality codes  No access given to documents marked with unknown confidentiality codes

18 XDR & XDM XDR & XDM Same responsibilities Should include copy of relevant Consents Importer needs to coerce the confidentiality codes Need to recognize that in transit the document set may have been used in ways inconsistent (e.g. Physical Access Controls)

September, 2005What IHE Delivers 19 Examples

20 Sample: HIMSS Privacy Demo Normal sharing  treatment, operations, and billing.  The normal sharing policy is implicit and does not need to exist prior to publication of documents  OID-A = Sensitive topic  (e.g. HIV tests, and victims of domestic violence)  restricted sharing for treatment operations and billing.  Emergency override is allowed in cases with serious threat to patient safety, emergency override audit logging must be done.  OID-B =

21 Basic Patient Privacy Consents Example Encounter 1 (Patient Requires A) Encounter 2 (Patient OK with B) Log-in= local role R1 R1=Consent B Register Log-in= local role R3 R3=Consent A&B QueryRetrieve Consent A Consent B Register RHIO XDS Doc Registry/Repositories

22 Entries restricted to health service Private entries shared with GP Private entries shared with several named parties Entries restricted to sexual health team Entries accessible to administrative staff Entries accessible to clinical in emergency Entries accessible to direct care teams Sensitive Document Accessibility Source: Dipak Kalra & prEN

23 Sample Consent Policies HIV StatusInformation published under the HIV Status policy may be released to: The healthcare providers providing treatment to the patient for HIV or related illness at the institution where the consent was provided. The patient and/or their legal representative. Any payer responsible for payment of that treatment. Sexual Health Information Information published under the Sexual Health Information policy may be released to: The healthcare providers providing treatment to the patient for the Sexual Health at the institution where the consent was provided. The patient and/or their legal representative. Any payer responsible for payment of that treatment. Mental Health Information Information published under the Mental Health Information policy may be released to: The healthcare providers providing treatment to the patient for the Mental Health at the institution where the consent was provided. The patient and/or their legal representative. Any payer responsible for payment of that treatment. Developmental Disability Information Information published under the Developmental Disability Information policy may be released to: The healthcare providers providing treatment to the patient for the Developmental Disability at the institution where the consent was provided. The patient and/or their legal representative. Any payer responsible for payment of that treatment Alcohol/Drug Abuse Information Information published under the Alcohol/Drug Abuse Information policy may be released to: The healthcare providers providing treatment to the patient for Alcohol/Drug Abuse at the institution where the consent was provided. The patient and/or their legal representative. Any payer responsible for payment of that treatment. TreatmentInformation published under the Treatment policy may be released to: Any healthcare provider providing treatment to the patient. The patient and/or their legal representative. Any payer responsible for payment of that treatment. ResearchInformation published under the research policy may be accessed by researchers.

24 Policy Agreement Interoperability and Standards Document Map Example: using ISO TS26000 Health Informatics PMAC- Part 1 Overview and Policy Management eHealthConnecticut

25 Operational Policies Content Dependent Upon Service Provision Annex A – System Implementation  This document describes the system process and testing requirements for RHIO participants both for implementation and routine monitoring. Annex C - Business Continuity & Disaster Recovery Plan  This document describes the responsibilities and processes to protect business continuity in the event of system availability issues or failures Annex E – Audit Policy  This document describes the audit requirements for RHIO participants including retention times, investigation support, and routine monitoring. Annex F – Archive Policy  This document describes archival requirements for RHIO participants. Annex H – Participants Roster eHealthConnecticut

26 Policy Documents Policy Agreement  Legal Umbrella Document Annex B – BAA Annex D - Interoperability Policy  This document describes the interoperability requirements and specifications including standard content, identification schemes, vocabularies, actors and transactions supported by the RHIO and required of RHIO participants Annex G – RHIO Patient Authorization for Sharing of Health Information  This document serves as a common patient authorization for access to and disclosure of health information, and is aligned with system information access management configuration. eHealthConnecticut

27 Policy for Sensitivity Classification RHIO-wide specification for classification of sensitive data CEN/ISO Standards-based Sensitivity What defines  Care Management data that is accessible administrative staff  Clinical Management data that is accessible to health related professionals  Clinical Care data that is accessible to Healthcare professionals  Privileged care that is accessible to privileged health professional  Personal Care data that is accessible to personal health professionals eHealthConnecticut

28 eHealthConnecticut Sensitivity classes Care Management  Patient admission, clerk, billing Clinical Management  Technicians, lab, Clinical Care  Direct and indirect care Privileged Care  Mental Health, Substance Abuse, AIDS Personal care  Patient directed blocks Functional Role Subject of Care Subject of care agent Personal health professional  Named by patient Privileged health professional  Role specific Health-related professional  technician Administrator  clerk

29 Provide Authorization to Access History Standards-based expression to enable automated processing which data – Standards-based Sensitivity  Care Management (e.g. administrative staff)  Clinical Management (e.g. radiology staff)  Clinical Care (e.g. most clinical staff)  Privileged care (Mental Health, HIV…)  Personal Care (abortion, substance abuse…) to whom – Standards-based Functional Role  Subject of Care  Subject of Care Agent  Personal Healthcare Professional  Privileged Healthcare Professional  Healthcare Professional  Health-related Professional  Administrator for what purpose (HIE Policy is to restrict all use to clinical care purposes)  At the request of the individual (no purpose need be specified)  Insurance Eligibility/Benefits__ Marketing  Additional Medical Care__ Research  Teaching eHealthConnecticut

30 Consent Matrix Care Mgmt Clinical Mgmt Clinical Care Privileged Care Personal Care Subject of Care YesYesYesYesYes Subject of Care Agent YesYesYesYesYes Personal Health Professional YesYesYesYesYes Privileged Health Prof YesYesYesYesYes Health Prof YesYesYesSpecialSpecial Health-Related Prof YesYesYesSpecialNo AdministratorYesYesSpecialNoNo

31 eHealthConnecticut Treatment allowed uses are enforced through typical role-based-access referencing functional role A Policy Table shows allowed use between sensitivity classes vs functional role Some table entries include special behaviors Healthcare Professional needs to get a consent- to-disclose on each publication and/or use of Privileged Care and Personal Care sensitivity classes Healthcare Professional needs to get a consent- to-disclose on each publication and/or use of Privileged Care and Personal Care sensitivity classes Personal care sensitivity class data when accessed by a healthcare professional requires the review the patient’s published consent. Personal care sensitivity class data when accessed by a healthcare professional requires the review the patient’s published consent.

32 Active Consents Centric All clinical documents are published with sub- set of confidentiality codes, indicating the type of data only, not the status of consent at the moment. Consent acts are captured and managed as indicated. Including replacement, and time constraints On USE, the Document Consumer is responsible for pulling down all current consent document, and treating the clinical documents according to current consent documents

33 Not currently available Lab results that shouldn’t be disclosed to the patient until they are consulted to by their GP.  Could be supported with xds-metadata change transaction Patient block for specified individual  Could be through required viewing by the human user of current patient consent policy, with human enforcement  Future policies may be machine processable Patient authorization of specified agent  Could be through required viewing by the human user of current patient consent policy, with human enforcement  Future policies may be machine processable

September, 2005What IHE Delivers 34 Questions?