Interoperability Roadmap Comments Package Transport and Security Standards Workgroup Dixie Baker, Chair Lisa Gallagher, Co-Chair April 22, 2015.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

ELTSS Alignment to Nationwide Interoperability Roadmap DRAFT: For Stakeholder Consideration in response to public comment.
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Interoperability Roadmap Comments Package Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair February 24, 2015.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Security Controls – What Works
Certification NPRM Comments Package Transport and Security Standards Workgroup Dixie Baker, Chair Lisa Gallagher, Co-Chair May 20, 2015.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Copyright 2012 Delmar, a part of Cengage Learning. All Rights Reserved. Chapter 13 Health Information Systems and Strategy.
Connecting Health and Care for the Nation: A Shared Nationwide Interoperability Roadmap – DRAFT Version 1.0 Joint FACA Meeting Chartese February 10, 2015.
Consumer Work Group Presentation Federal Health IT Strategic Plan January 9, 2015 Gretchen Wyatt Office of Planning, Evaluation, and Analysis.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Tackling the Policy Challenges of Health Information Exchange Carol Diamond, MD, MPH Managing Director, Markle Foundation.
Strategy and Innovation Workgroup: Recommendations on the Federal Health IT Strategic Plan March 4, 2015 David Lansky, Chair Jennifer Covich,
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
State Alliance for e-Health Conference Meeting January 26, 2007.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
HIT Standards Committee Privacy and Security Workgroup: Privacy and Security Workgroup: Update Dixie Baker, SAIC Steve Findlay, Consumers Union March 24,
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
January 26, 2007 State Alliance for e-Health January 26, 2007 Robert M. Kolodner, MD Interim National Coordinator Office of the National Coordinator for.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
(Slide 1 of 22) Response to the National Vaccine Advisory Committee Recommendations on the Immunization Safety Office Scientific Agenda Frank DeStefano,
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
The Patient Choice Project Project Kickoff December 14 th, 2015.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Moving the National Health Information Technology Agenda Forward The Fourth Health Information Technology Summit March 28, 2007 Robert M. Kolodner, MD.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
HIT Standards Committee Privacy and Security Workgroup Task Update: Standards and Certification Criteria for Certifying EHR Modules Dixie Baker, Chair.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Workgroup Introduction & Trust Mark Briefing Transport & Security Standards Workgroup September 22, 2014.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Office of the Secretary Office for Civil Rights (OCR) Enforcement and Policy Challenges in Health Information Privacy Linda Sanches HIPAA Summit Special.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
8 Building Blocks of National Cyber Strategies
Enforcement and Policy Challenges in Health Information Privacy
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Interoperability Roadmap Comments Package Transport and Security Standards Workgroup Dixie Baker, Chair Lisa Gallagher, Co-Chair April 22, 2015

TSS WG Members 2 Dixie B. Baker, Chair, Martin, Blanck, and Associates Lisa Gallagher, Co-Chair, Healthcare Information and Management Systems Society Jeff Brandt, Member, Consultant Brian Freedman, Member, Security Risk Solutions, Inc. John Hummel, Member, Tahoe Forest Hospital District LeRoy Jones, Member, GSI Health Boban Jose, Member, RelayHealth Peter Kaufman, Member, DrFirst Steven Lane, Member, Sutter Health Aaron Miri, Member, Children's Medical Center Scott Rea, Member, DigiCert Jason Taule, Member, FEi Systems Sharon F. Terry, Member, Genetic Alliance Jeremy Maxwell, Staff Lead, HHS/ONC

Agenda 1.Section E – Ubiquitous, Secure Network Infrastructure 2.Section F – Verifiable identity and authentication of all participants 3.Section G – Consistent representation of permission to collect, share and use identifiable health information 4.Interoperability Roadmap Critical Actions 3

Comments – Section E Ubiquitous, secure network infrastructure Enabling an interoperable, learning health system requires a stable, secure, widely available network capability that supports vendor-neutral protocols and a wide variety of core services. 4

Section E – Ubiquitous, secure network infrastructure E1(a). What should the federal government (specifically) focus on first to move towards a uniform approach to enforcing cybersecurity in healthcare (keeping HIPAA and CEHRT Rules in mind and possible new cybersecurity legislation)? The Transport and Security Standards Workgroup (TSS WG) recommends that ONC partner with the National Institute of Standards and Technology (NIST), the Office of Civil Rights (OCR), other federal agencies, and industry stakeholders in several ways to enable a uniform approach to enforcing cybersecurity in healthcare. 5

Section E – Ubiquitous, secure network infrastructure E1(a) – Continued First, ONC should work to advance a consistent trust framework across the health IT ecosystem. Such a trust framework should allow for diversity in organizational policy, while enabling a foundational basis for mutual trust among organizations. Second, ONC should endorse a set of appropriate baseline security controls that are uniformly applied to health IT technologies that enter the ecosystem. 6

Section E – Ubiquitous, secure network infrastructure E1(a) – Continued Third, ONC should work with industry to accommodate a diversity of emerging health IT technologies across infrastructures within the health IT ecosystem. Health IT infrastructures must be flexible, in that they should permit any certified health IT solution to operate within the ecosystem. Fourth, ONC should provide guidance on proper governance in cybersecurity, which is essential for building trust and security throughout the ecosystem. Finally, the ONC should bring together federal, state, and industry stakeholders to address the goal of reducing variations in cybersecurity enforcement. 7

Section E – Ubiquitous, secure network infrastructure E1(b). Are there frameworks, methodologies, incentive programs, etc. that the healthcare industry has not, but should, consider? ONC should consider the following in further establishing trust across the health IT ecosystem: First, ONC should consider including the “Trustmark Framework” developed in a NIST / National Strategy for Trusted Identities in Cyberspace (NSTIC) pilot, PCI Security Standards, and the ISO series as possible frameworks for establishing electronic trust among healthcare organizations across the Internet. Second, cybersecurity needs to be considered for both enterprises and for interconnections among enterprises. 8

Section E – Ubiquitous, secure network infrastructure E1(b) – Continued Third, the healthcare industry needs a minimum set of standards and metrics for measuring the strength of security protections. A number of “minimum standard sets” exist and can be drawn from. These include, but may not be limited to: OCR’s minimum standards for control areas, the Certification Authority Browser (CA/B) Forum Baseline Requirements, and the questions asked by cybersecurity insurance companies and financial auditors. Fourth, the existing security control frameworks (including NIST’s cybersecurity framework) should be considered for alignment and guidance when gaps occur. 9

Section E – Ubiquitous, secure network infrastructure E2. Are there other gaps (aside from lack of policies and guidance for implementing encryption) in technology and standards for encryption? ONC should work with OCR, other federal partners, and industry stakeholders to address the following issues related to technology and standards for encryption. First, ONC should provide guidance on encryption key lifecycle management. Second, ONC should provide guidance on a method for encryption key escrow recovery. 10

Section E – Ubiquitous, secure network infrastructure E2 – Continued Third, ONC should publish guidance on key oversight and authorization, addressing the people or entities that maintain access to encryption keys. Finally, ONC should also consider providing guidance on a minimum set of circumstances in which encryption should be used to secure data (i.e., medical devices, systems, and software). 11

Comments – Section F Verifiable identity and authentication of all participants Legal requirements and cultural norms dictate that participants be known, so that access to data and services is appropriate. This is a requirement for all participants in a learning health system regardless of role (individual/patient, provider, technician, etc.) 12

Section F – Verifiable identity and authentication of all participants F1. What ID proofing and authentication standards, policies, and protocols can we borrow from other industries? Is healthcare that different from banking, social media, or ? Yes, healthcare is “that different.” Although good cybersecurity best practices can be applied similarly across different industries, ONC should acknowledge that because of the sensitivity and criticality of data used in the healthcare industry, and the need for convenient access to data, sometimes in emergency circumstances, healthcare is notably different from banking, social media and . Credit cards can be replaced, and new accounts can be generated, but deeply personal genetic or treatment information cannot be replaced or recalled once it is disclosed. Some harms may be irreparable. 13

Section F – Verifiable identity and authentication of all participants F1 – Continued Many security protections (e.g., access control, audit, digital signature) are dependent upon user identity, and for this reason, health information requires a high level of assurance in the processes and mechanisms used for identity proofing and authentication. ONC – together with OCR, other federal partners, and industry stakeholders – should continue to support the National Strategy for Trusted Identities in Cyberspace (NSTIC) program and to draw from existing pilots, where applicable. ONC should support NIST’s effort to update SP and to help assure its applicability to and utility for healthcare use cases. 14

Section F – Verifiable identity and authentication of all participants F1 – Continued ONC should provide guidance on the use of third-party identity proofing services, including trusted Internet identities used by individuals for everyday life activities such as banking, social media and shopping. Such guidance should affirm that the use of such third-party Internet identities should be contingent on their use of high-assurance methods for identity verification, consistent with evolving healthcare laws and regulatory requirements. 15

Comments – Section G Consistent representation of permission to collect, share and use identifiable health information Though legal requirements differ across the states, nationwide interoperability requires a consistent way to represent an individual's permission to collect, share and use their individually identifiable health information, including with whom and for what purpose(s). 16

Section G – Consistent representation of permission to collect, share and use identifiable health information G1. What standards should we put forward in the 2016 standards advisory for basic choice? Today’s “standard” for basic choice is a paper document that is hand-signed by the patient. We appreciate ONC’s recognition of the limited utility and scalability of this model in electronic exchange, and we share ONC’s desire to identify open standards for electronically capturing, representing, exchanging, and interpreting patient consent. 17

Section G – Consistent representation of permission to collect, share and use identifiable health information G1 – Continued Full end-to-end electronic capture, representation, exchange, and interpretation of patient consent is technologically possible and currently used in limited circumstances. However, we know of no mature standards that are widely used to electronically capture or represent patient consent decisions. Various efforts are underway, including work by Oasis and HL7, and ONC should continue to monitor these developments. 18

Section G – Consistent representation of permission to collect, share and use identifiable health information G2. How much work should ONC be doing on other standards while clarifying permitted uses? If standards development needs to be done, what should we be working on (DS4CDS v. DS4P v. something else)? Rather than commit resources to creating new standards, ONC should monitor and, where appropriate, engage in existing efforts to capture consent electronically. This includes the development of emerging consumer consent technologies. We recognize electronic (computable) consent is valuable for the future of health IT. 19

Section G – Consistent representation of permission to collect, share and use identifiable health information G2 - Continued ONC should also provide guidance that defines computable, discrete data fields needed for negotiating patient consent and access to health information. Common semantics for discrete data fields would further assist in determining whether the protected health information or personally identifiable information should be shared. ONC should continue to monitor SAMHSA pilots and the application of DS4P technology, and derive lessons learned from those efforts. 20

Comments to Interoperability Roadmap Critical Actions Sections E and G 21

Comments – Section E Critical Actions E1. Cybersecurity (2) ONC will coordinate with the Office of the Assistant Secretary for Preparedness and Response (ASPR) on priority issues related to cyber security for critical public health infrastructure. Replace “critical public health infrastructure” with “critical health infrastructure” (which includes, but is not limited to, “public” health infrastructure). In considering the cybersecurity needs of the nation’s health infrastructure, availability and resiliency, data integrity, and confidentiality should all be considered as part of the critical components for organizational preparedness and response. In addressing issues related to preparedness and disaster recovery for cyber attacks, ONC should consider learning from, and building upon, the National Disaster Medical System (NDMS). Today, the NDMS public health system works offline and has been tested in prior public health emergencies. 22

Comments – Section E Critical Actions E1. Cybersecurity (3) HHS will continue to support, promote and enhance the establishment of a single health and public health cybersecurity Information Sharing and Analysis Center (ISAC) for bi-directional information sharing about cyber threats and vulnerabilities between private health care industry and the federal government. We support this action. For the out years, ONC should provide guidance and reference implementations for enabling healthcare organizations to electronically consume threat information to minimize the risk and impact of cyber-attacks. 23

Comments – Section G Critical Actions G4. Technical standards for basic choice (3) Technology developers implement technical standards and implementation guidance for consistently capturing, communicating and processing individual choice. Adoption has begun, with 5% of exchangers using the standards regularly. ONC should consider changing this from “ ” to “ ”. 24

Comments – Section G Critical Actions G4. Technical standards for basic choice (4) Technology developers implement technical standards and implementation guidance for consistently capturing, communicating and processing individual basic choice. Adoption continues, with a majority of exchangers using the standards regularly. Due to the advancements in genomics, ONC should consider changing this from “ ” to “ ”. 25

Comments – Section G Critical Actions G4. Technical standards for basic choice (5) Basic choice standards are used widely to electronically capture individuals’ desire to have their health information included in research. Since this is happening already, ONC should consider changing this from “ ” to “ ”. 26

References 27 EntityURL NSTIChttp:// ISOhttp:// NIST / NSTIC Trust Frameworkhttps://trustmark.gtri.gatech.edu CA/B Forumhttps://cabforum.org NIST Cybersecurity Frameworkhttp:// NDMShttp://ndms.fhpr.osd.mil