National eHealth Transition Authority and secure messaging 6 May 2009.

Slides:



Advertisements
Similar presentations
IT Infrastructure Glen Marshall Siemens Health Solutions IHE IT Infrastructure Committee Co-chair.
Advertisements

AORTA National IT-infra for healthcare applications Karel de Smet IT architect NICTIZ Noordwijkerhout, The Netherlands 2005 May 5th.
The Internet Information Systems, Intermediate 2.
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
How Many Ways Can You Connect To The Internet?
Web Services Darshan R. Kapadia Gregor von Laszewski 1http://grid.rit.edu.
The Aerospace Clinic 2002 Team Members Nick Hertl (Project Manager) Will Berriel Richard Fujiyama Chip Bradford Faculty Advisor Professor Michael Erlinger.
PKI and . Considerations Behind Firewall System Security On the Internet –Simple Mail Transfer Protocol (SMTP)
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
The Application Layer Chapter 7. Where are we now?
Computer Networks An Overview. A Computer Network!
The Internet Useful Definitions and Concepts About the Internet.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
1 Application Layer. 2 Writing Networked Applications TCP UDP IP LL PL TCP UDP IP LL PL TCP UDP IP LL PL Web Browser Web Server Ftp Server Ftp Client.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
Internet Basics.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
IT 210 The Internet & World Wide Web introduction.
Chapter 9 - Applications We will look at three main applications DNS (name services) SMTP ( ) HTTP (World Wide Web) Our main focus will be on DNS.
Basic Network Services IMT 546 – Lab 4 December 4, 2004 Agueda Sánchez Shannon Layden Peyman Tajbakhsh.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
1 Next Few Classes Networking basics Protection & Security.
Internetworking – What is internetworking? Connect multiple networks of one or more organizations into a large, uniform communication system. The resulting.
The Aerospace Clinic 2002 Team Members Nick Hertl (Project Manager) Will Berriel Richard Fujiyama Chip Bradford Faculty Advisor Professor Michael Erlinger.
How Does the Internet Work? Protocols Protocols are rules that describe how computers communicate and exchange data. The Internet has a series of these.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
1 Computer Networking Dr. Mohammad Alhihi Communication and Electronic Engineering Department Philadelphia University Faculty of Engineering.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
HEALTHCARE NEEDS STANDARDS BUT WHICH AND FOR WHAT?
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
Internet Infrastructure Mapping the World Wide Web.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
science/internet-intro
Internet Concept of protocols INTERNET Internet Service Provider (ISP) has connected to the Internet.
The Aerospace Clinic 2002 Team Members Nick Hertl (Project Manager) Will Berriel Richard Fujiyama Chip Bradford Faculty Advisor Professor Michael Erlinger.
URLs & Web Protocols 18 URLs & Web Protocols 18. URLs & Web Protocols 18 A URL is a web address Uniform Resource Locator You say it like ‘earl’ A resource.
Website Design and Construction Services and Standards.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
Introduction to the Internet
3.1 Types of Servers.
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
3.1 Types of Servers.
Some bits on how it works
3.1 Types of Servers.
Working at a Small-to-Medium Business or ISP – Chapter 7
Web Development & Design Chapter 1, Sections 4, 5 & 6
14-мавзу. Cookie, сеанс, FTP и технологиялари
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
WEB SERVICES From Chapter 19, Distributed Systems
Computer Networks Protocols
Presentation transcript:

National eHealth Transition Authority and secure messaging 6 May 2009

Where are we going? Semantic interoperability: –Level 1: no interoperability at all –Level 2: technical and syntactical interoperability (no semantic interoperability) –Level 3: two independent levels of partial semantic interoperability of meaningful fragments Level 3a: unidirectional semantic interoperability Level 3b: bidirectional semantic interoperability –Level 4: full semantic interoperability, sharable context, seamless co- operability

Where are we going?

Full semantic interoperability is a “lengthy, expensive and possibly unattainable goal” “Semantic Interoperability for Betther Health and Safer Healthcare”, Research and development roadmap for Europe - SemanticHEALTH Report Jan 2009

Interoperability “not so much to machines working together as to human beings understanding each other” –IEEE, 2005

Messaging: What have we got now? Store and forward Time Sender Message server Receiver Send Receive

Messaging: What have we got now? Store and forward Time Sender Message server Receiver Receive Send

Messaging: What have we got now? Point to point Sender Receiver

Messaging: What have we got now? Point to point Receiver Sender

What we need A directory Method of data transfer Method to “advertise” functions (e.g. get path report, receive referral, update details etc) #611 #581 #938 patientprovideragency

What we need Method to protect data and prove identity Standard clinical terminology –What does “cold” mean? –99 ways to say “room air” –126 ways to say “high blood pressure” Standard data structure PKI HL7 SNOMED CT

Web services Includes XML TCP (communication rules)Domain Name SystemRouters (traffic controllers) communication structure of the internet SMTP ( )HTTP (world wide web)and others protocols that run on the internet Web services

Web services <SOAP-ENV:Envelope SOAP-ENV:encodingStyle=" xmlns:SOAP-ENC=" xmlns:SOAP-ENV=" xmlns:xsd=" xmlns:xsi=" </SOAP-ENV:Envelope <SOAP-ENV:Envelope SOAP-ENV:encodingStyle=" xmlns:SOAP-ENC=" xmlns:SOAP-ENV=" xmlns:xsd=" xmlns:xsi=" Royal Eye & Ear Response Request

Web services Service Registry NeHTA developed and maintained Service Requester e.g. GP Service Provider e.g. Hospital Service Description Service Find Connect Publish Examples of services: Search Update a record Send path results Receive referral

Web services Service Registry NeHTA developed and maintained Service Requester e.g. GP Service Provider e.g. Hospital Service Description Service Find Connect Publish GPHospital Examples of services: Search Update a record Send path results Receive referral

Web services NeHTA’s vision: –No middle-man

PKI Not a technology so much as a methodology. There is no other way of: –Proving identity AND –Guaranteeing the integrity and provenance of a message.

The challenge Tony Abbott, 2003: 5 years from now we’ll have a shared electronic health record “In some ways this problem represents a standard chicken- and-egg dilemma—it is hard to understand the need to be enabled to utilise Web services when there are few existing services to consume and conversely there is no market to develop web services when there are few consumers enabled.” -NeHTA, Towards a secure messaging environment, 2006 Hence….

e-Health PIP Peter Flemming (new NeHTA CEO): “2009 is the year of delivery” –Significant pilots: discharge referral medication management –Recent announcement Consensus statement (b/ween Pathology peak bodies and NeHTA) e-Health PIP: incentivising as a driver for change

How do the products stack up? Web servicesPKIPKI signature ArgusMessenger AllTalk Division Report HealthLink Medical Objects ReferralNet How the main GP secure messaging products currently align with the direction implied by the e-Health PIP. The greyed-out ticks indicates the understanding that this work is mature but not yet released in the product. Information sourced by a variety of means, and is an indicator only. The situation could change at any time and a serious assessment requires confirmation with vendors.

So, what do we do? Look for: –Web services. –Digital signing with PKI. –Directory integration. –Usability Ease of install. Ease of use. Ease of maintenance/monitoring. –Integration A service using web services that communicates with another. –Hospital direction. –Discuss options with division and SBO colleagues.

NeHTA’s security requirements Identification: –Provide the ability to physically and electronically identify the party through descriptions, names, keys and validation details; Authentication: –Enable the identification of an entity; Confidentiality: –Ensure the privacy of the information within the message by preventing disclosure to unauthorised parties and ; Integrity: –Ensure that the information is not altered by unauthorised entities in a way that is not detectable by authorised entities;

NeHTA’s security requirements Non-repudiation of Origin: –Ensure that the sender of a message cannot deny they were the originator/sender of that message and that it has not been sent; Non-repudiation of Receipt: –Ensure that the receiver of a message cannot deny receipt of that message; Access Control: –Provide the ability to grant privileges to information, systems or resources; Audit / Logging: –Support the monitoring and logging of message interaction to aid fault detection and prevent misuse; and Privacy: –Control or influence the handling of data about an individual.

Assessment Approach Ascertain all products Ascertain all products Basic assessment Detailed assessment Detailed assessment Demo Assessment Fitness for Purpose and Ranking OUTCOME Assessment Principles 1.Meet open standards 2.Be accepted in the market place 3.Have future capacity 4.Be scalable/transferable 5.Provide an architectural foundation 6.Support technical requirements 7.Sustainable business model 8.Acceptable support model 9.Cost effective 10.Leverage existing investments 11.Transparency to users 12.Provision of value added service ENVIRONMENTAL ASSESSMENT ENVIRONMENTAL ASSESSMENT State Projects GP Readiness Specialist Readiness PRODUCT ASSESSMENTS Contract negotiation Application tailoring Implementation planning

Assessment criteria & questions Meet Open Standards criteria –providing a level playing field for conformant interoperability without vendor prejudice; How do you meet the NeHTA Standards: - interoperability, security, web services(find more)? How does your product use HL7? How does your software address the private transmission/receipt of patient data? How does your product manage a provider directory? Be accepted in the market place –solutions exist or can be readily created around the standards; What is your experience in the Health industry (Referees – divisions/GPs)

Assessment principles Have future capacity –be able to grow with emerging standards to support new capabilities; How will your product be able to grow with emerging standards to support new capabilities? Be scalable –for a broad range of technical capabilities from sole providers to large institutions; Can you provide examples of your product working in similar environments to our environment Can you provide examples of a broader GP/Allied health electronic communication application (ie GP-aged care, GP-Hospital, GP-Pharmacy)

Assessment principles Support technical requirements –delivering sufficient technical capability to meet secure messaging requirements. Can you provide detailed specifications? Sustainable business model –does the vendor have an appropriate and scalable business model to give confidence of future viability Sustainable business relationship Governance structures Ongoing viability

Assessment principles Acceptable support model –does the vendor provide a support model that meets the needs of the users; What support (helpdesks) can you provide this group during the installation of the product What ongoing user support do you provide Cost effective –is the solution cost effective for users & divisions; What is your costing model? Please address the areas of: –Licence –installation –maintenance (including patches) –upgrades –ongoing support –Training

Assessment principles Leverage existing investments –does the solution build on existing investments in infrastructure and standards; Transparency to users –is the solution transparent to the end user – or at least minimise the impact on the users; Which clinical and messaging systems is your product compatible with? Please discuss your products relationship with these products. How does your product interact with non-clinical systems such as Microsoft Word?

Assessment principles Provision of value-add services –does the solution provide additional services that deliver added value or improvement for users and their business processes; Does your product/company provide additional products/services other than those outlined above within the Health environment