Data Provenance Community Meeting December 18, 2014.

Slides:



Advertisements
Similar presentations
Data Provenance Community Meeting January 15, 2015.
Advertisements

Electronic Submission of Medical Documentation (esMD) for Medicare FFS Presentation to HITSC Provenance Workgroup January 16, 2015.
Electronic Submission of Medical Documentation (esMD) AoR L2 Harmonization June 19, 2013.
S&I Data Provenance Initiative Questions for the HITSC on the S&I Data Provenance Initiative November 18, 2014 Julie Anne Chua, PMP, CAP, CISSP Office.
Standards and Harmonization Data Provenance S&I Framework December 4 th,
Data Provenance Initiative Launch April 10 th, 2014 Joy Pritts, JD - Chief Privacy Officer, ONC Julie Chua PMP, CAP, CISSP - Information Security Specialist,
Data Provenance Community Meeting November 13, 2014.
Data Provenance –Use Case (Discovery) Ahsin Azim– Use Case Lead Presha Patel – Use Case Lead 1.
Electronic Submission of Medical Documentation (esMD) Electronic Determination of Coverage (eDoC) Home Health User Story February 4, 2015.
Data Provenance Community Meeting December 11, 2014.
Data Access Framework (DAF) All Community Meeting September 4th, 2013.
Data Provenance Information Interchange Sub-Workgroup March 12 th, 2015.
Data Provenance Information Interchange Sub-Workgroup March 19 th, 2015.
Data Provenance All Hands Community Meeting February 19, 2015.
S&I Public Health * We will start the meeting 3 min after the hour October 7 th, 2014.
Data Access Framework All Hands Community Meeting 1 September 23, 2015.
Data Provenance Community Meeting September 4 th, 2014.
EHR-S Functional Requirements IG: Lab Results Interface Laboratory Initiative.
Data Provenance –Use Case (Discovery) Ahsin Azim Nisha Maharaja Presha Patel 1.
Data Provenance Community Meeting May 1 st, 2014.
Data Provenance –Use Case (Discovery) Ahsin Azim– Use Case Lead Presha Patel – Use Case Lead 1.
Data Segmentation for Privacy Agenda All-hands Workgroup Meeting May 9, 2012.
Data Provenance Community Meeting May 22 nd, 2014.
Data Provenance All Hands Community Meeting February 5, 2015.
Data Provenance Tiger Team May 27 th, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Lynette ElliottLynette Elliott – Tiger Team Support.
Data Provenance Community Meeting September 25 th, 2014.
Data Provenance –Use Case (Discovery) Ahsin Azim Nisha Maharaja Presha Patel 1.
Data Provenance Tiger Team July 14, 2014 Johnathan Coleman Johnathan Coleman – CBCC Co-chair/ S&I Initiative Coordinator Lynette ElliottLynette Elliott.
Data Provenance Community Meeting August 21st, 2014.
Data Provenance Community Meeting November 6, 2014.
DPROV System Requirements Sub Work Group February 27 th, 2014.
Data Provenance –Use Case (Discovery) Ahsin Azim– Use Case Lead Presha Patel – Use Case Lead 1.
Data Provenance Tiger Team May 9 th, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Lynette ElliottLynette Elliott – Tiger Team Support.
Data Provenance Community Meeting September 11 th, 2014.
Meeting Etiquette Please announce your name each time prior to making comments or suggestions during the call Remember: If you are not speaking keep your.
Electronic Submission of Medical Documentation (esMD) Electronic Determination of Coverage (eDoC) Workgroup August 21, 2013.
Data Provenance Tiger Team May 19 th, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Lynette ElliottLynette Elliott – Tiger Team Support.
Data Access Framework All Hands Community Meeting April 23, 2014.
EsMD Pilots Workgroup December 12 th, Meeting Etiquette Please announce your name each time prior to making comments or suggestions during the call.
S&I Public Health Education Series: Data Provenance July 9th, 2014 Johnathan Coleman Initiative Coordinator – Data Provenance ONC/OCPO/OST (CTR)
Data Provenance –Use Case (Discovery) Ahsin Azim– Use Case Lead Presha Patel – Use Case Lead 1.
Data Provenance Community Kick Off April 24 th, 2014.
Data Provenance All Hands Community Meeting June 11, 2015.
Data Access Framework All Hands Community Meeting 1 November 4, 2015.
Data Access Framework All Hands Community Meeting April 2, 2014.
The Patient Choice Project Project Kickoff December 14 th, 2015.
Electronic Submission of Medical Documentation (esMD) Electronic Determination of Coverage PMD User Story & Harmonization August 7, 2013.
Data Provenance Tiger Team June 16, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Lynette ElliottLynette Elliott – Tiger Team Support.
Data Provenance Community Meeting May 15 th, 2014.
Data Provenance Community Meeting November 13, 2014.
Data Access Framework All Hands Community Meeting 1 November 18, 2015.
Data Provenance Community Meeting July 17 th, 2014.
Data Access Framework All Hands Community Meeting July 16, 2014.
Data Provenance Community Meeting November 6, 2014.
Data Access Framework All Hands Community Meeting April 9, 2014.
Data Access Framework All Hands Community Meeting April 16, 2014.
Data Provenance –Use Case (Discovery) Ahsin Azim– Use Case Lead Presha Patel – Use Case Lead 1.
Health eDecisions (HeD) All Hands Meeting February 21st, 2013.
Data Provenance All Hands Community Meeting March 5, 2015.
Data Provenance Community Meeting August 7th, 2014.
Data Provenance All Hands Community Meeting February 19, 2015.
Data Provenance All Hands Community Meeting June 18, 2015.
Data Provenance Tiger Team June 2, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Lynette ElliottLynette Elliott – Tiger Team Support.
Data Provenance All Hands Community Meeting February 26, 2015.
Data Access Framework All Hands Community Meeting 1 April 20, 2016.
Data Access Framework All Hands Community Meeting April 16, 2014.
Data Provenance Community Meeting June 19 th, 2014.
Data Provenance All Hands Community Meeting May 19th, 2016.
Data Access Framework All Hands Community Meeting 1 March 23, 2016.
Data Provenance Tiger Team April 28 th, 2014 Johnathan Coleman Johnathan Coleman - Initiative Coordinator Bob Yencha Bob Yencha – Subject Matter Expert.
Presentation transcript:

Data Provenance Community Meeting December 18, 2014

Meeting Etiquette Please mute your phone when you are not speaking to prevent background noise. – All meetings are recorded. Please do not put your phone on hold. – Hang up and dial back in to prevent hold music. Please announce your name before speaking Use the “Chat” feature to ask questions or share comments. – Send chats to “All Participants” so they can be addressed publicly in the chat, or discussed in the meeting (as appropriate). 2 Click on the “chat” bubble at the top of the meeting window to send a chat.

Agenda TopicTime Allotted Announcements5 minutes HL7 Implementation Guide for CDA® Release 2: Digital Signatures and Delegation of Rights, Release 1 Presentation by Bob Dieterle 25 minutes HL7 EHR Records Management and Evidentiary Support (RM- ES) Functional Model, Release 1 Presentation by Reed Gelzer and Diana Warner 25 minutes Comments and Questions5 minutes

4 Today Standards Evaluation Solution Planning IG Development DPROV Harm Launch Standards SME presentations Solution Planning Create IG Template Introduction Implementation Approach Suggested Enhancements End-to-End Review 1/29 – 3/5 10/23 – 1/8 12/15 - 1/5 1/22 - 2/5 3/5 – 4/5 4/5 – 4/12 4/12 – 5/5 DPROV Harmonization Timeline Standards Analysis & Assessment 1/8-2/5

Data Provenance Standards Presentations Schedule DateStandard to PresentSME NameConfirmed 11/20/2014 ISO Health Informatics: Trusted End-to-End Information FlowsGary Dickinson Y SOAPGlen Marshall Y THANKSGIVING HOLIDAY 12/4/ C-CDA 2. CDA R2 3. HL7 Implementation Guide for CDA® Release 2: Data Provenance, Release 1 – US Realm 4. HL7 V2 Bob Yencha + Kathleen Connor Y 12/11/ HL7 EHR Interoperability Model DSTU (2007) 2. HL7 Implementation Guide for CDA Release 2: Reference Profile for EHR Interoperability DSTU (2008) 3. HL7 EHR Lifecycle Model DSTU (2008) 4. ISO/HL EHR System Functional Model, Release 2 (2014) 5. HL7 Record Lifecycle Events on FHIR (project underway 2014 for FHIR DSTU Release 2) Gary Dickinson Y 12/18/2014 HL7 Implementation Guide for CDA® Release 2: Digital Signatures and Delegation of Rights, Release 1 Bob Dieterle Y HL7 EHR Records Management and Evidentiary Support (RM-ES) Functional Model, Release 1 Reed Gelzer Diana Warner Y 1/8/2015 As a grouping of Implementation Guides: 1. HL7 Health Care Privacy and Security Classification System, Release 1 2. HL7 Version 3 Standard: Privacy, Access and Security Services (PASS) 3. HL7 Version 3 Standard: Privacy, Access and Security Services; Security Labeling Service, Release 1 (SLS) *Associated vocabulary HL7 Implementation Guide: Data Segmentation for Privacy (DS4P), Release 1 Kathleen Connor Y HL7 Implementation Guide for CDA®, Release 2: Consent Directives, Release 1 Kathleen Connor + Serafina Versaggi Y 1/15/2015 HL7 FHIR DSTU Release 1.1 Provenance Resource Reed Gelzer + Gary Dickinson N

Updated Candidate Standards #TransactionContent and Structure Terminology and Code Values - DP TransportSecurity 1 a) Start Point sends clinical data with provenance information to End Point *C-CDA *CDA R2 *W3C PROV: PROV-AQ, PROV- CONSTRAINTS, PROV-XML *Personal Health Record System Functional Model *HL7 EHR Records Management and Evidentiary Support (RM-ES) Functional Model, Release 1 *ISO/HL7 EHR System Functional Model Release 2 *HL7 EHR Lifecycle Model (2008) *HL7 Record Lifecycle Event Metadata using FHIR (project underway 2014) *HL7 V.2.x *ISO Health Informatics: Trusted End-to-End Information Flows *HL7 FHIR DSTU Release 1.1 Provenance Resource *HL7 Implementation Guide for CDA® Release 2: Data Provenance, Release 1 – US Realm *HL7 Implementation Guide for CDA®, Release 2: Consent Directives, Release 1 *HL7 EHR Interoperability Model DSTU (2007) *HL7 Implementation Guide for CDA Release 2: Reference Profile for EHR Interoperability DSTU (2008) *HL7 V.2/ V.3 Vocabulary & Terminology Standards *Representation State Transfer (RESTful) *Cross Enterprise Document-Sharing XDS *SOAP *HL7 Implementation Guide: Data Segmentation for Privacy (DS4P), Release 1 * HL7 Health Care Privacy and Security Classification System, Release 1 (HCS) *HL7 Version 3 Standard: Privacy, Access and Security Services (PASS) *HL7 Version 3 Standard: Privacy, Access and Security Services; Security Labeling Service, Release 1 (SLS) *HL7 Implementation Guide for CDA® Release 2: Digital Signatures and Delegation of Rights, Release 1 2 a) Start Point sends clinical data to transmitter with provenance information 2 b) Transmitter send clinical data to end point with provenance information 3 a) Start Point sends clinical data to assembler/composer with provenance information 3 b) Assembler/composer compiles clinical data which is sent to end point with provenance information

Digital Signatures and Delegation of Rights Presentation to Data Provenance December 18 th, 2014

HL7 Implementation Guide for CDA® Release 2: Digital Signatures and Delegation of Rights, Release 1 HL7 DSTU Sponsored by: Structured Documentation Work Group Attachments Work Group Security Work Group HL7 CDA Digital Signatures

This implementation guide defines a method to imbed digital signatures in a CDA document and provides an optional method of specifying delegation of right assertions that may be included with the digital signatures. This implementation guide will allow health plans, payers, and providers to accurately authenticate the Authorized Signer(s) of a CDA document and trust the validity and authenticity of signed medical documentation. This implementation guide specifies the content of the sdtc:signatureText element when included as part of the legalAuthenticator and/or authenticator participant occurrences. Examples of the sdtc:signatureText are defined in the HL7 Implementation Guide for CDA® Release 2: Consolidated CDA Templates for Clinical Notes (US Realm) Draft Standard for Trial Use Release 2 (C-CDA) Background

This document provides guidance on the use of digital signatures imbedded in a CDA document to: Provide a non-repudiation signature that attests to the role and signature purpose (see Table 4 ‑ 4. Code Sets for role and signature purpose code sets) of each Authorized Signer to the document. Provide for a delegation of rights where the signer is a Delegated Signer and not the Authorized Signer responsible individual or organization (e.g., the signer is acting as an authorized agent). Provide a medical/legal attestation for administrative and clinical purposes such as documenting transfer of clinical care Provide for both digital co-signatures and counter signatures. Purpose

An Authorized Signer may play a role in the document, such as ‘author’, and would therefore be represented in the author participation declared in the header. The Authorized Signer will also be represented as an authenticator in the header. In the sdtc:signatureText for the authenticator, the Authorized Signer will have a signerRole. If this Authorized Signer claims to be an anesthesiologist, signing as an author, then this information would be represented in the signerRole as the claimedRole and signaturePurpose. Through appropriate use of both signerRole and signaturePurpose, digital signatures can accommodate co-signatures on any CDA (e.g. multiple Authorized Signers can indicate that they are co-authors). In addition, since the XAdES-X-L standard used by this guide supports counter signatures, any digital signature may be countersigned. Example

Identify a method of incorporating digital signatures and delegation of right assertions into the header of a CDA document. Identify a digital signature standard for a CDA document that supports the exchange of a signed: – Digest of the message; – Timestamp; – Role of the signer; – Purpose of signature. Identify a digital signature standard for: – The public certificate of the signer; – Long term validation data, including Online Certificate Status Protocol (OCSP) response and/or Certificate Revocation List (CRL). Identify a standard to assert a delegation of rights that supports the exchange of: – The certificate ID of both parties; – The purpose of the delegation; – The effective date range of the assertion. Identify a method to validate an existing delegation of rights assertion.. Goals of IG

The signer creates the XAdES-X-L Digital Signature and populates it with all required elements including: The signer’s public X.509v3 signing certificate The Digest of the CDA (see Section and the SignedProperties) The Signed Digest The following signed elements: – Coordinated Universal Time (UTC) – Role Healthcare Taxonomy Data Set Personal and Legal Relationship Role Type – Signature Purpose ASTM E – A signed OCSP (Online Certificate Status Protocol) or CRL (Certificate Revocation List) in the RevocationValues element Signature Process

In general, the Delegation of Rights process proceeds as follows: The Authorized Signer creates and digitally signs a Delegation of Rights Assertion; the resulting Delegation of Rights Artifact is provided to the Delegated Signer. When creating a Digital Signature, the Delegated Signer requests a Validated Delegation of Rights Artifact from the Delegation Validator. Assuming the Delegation of Rights is still valid, the Delegation Validator issues a Validated Delegation of Rights Artifact. The Delegated Signer signs a CDA document on behalf of the Authorized Signer and includes the Validated Delegation of Rights Artifact as proof of the granted right to sign. Overview of Delegation of Rights

The following steps must be taken for an Authorized Signer to issue a Delegation of Rights Artifact to a Delegated Signer: Authorized Signer creates Delegation of Rights Assertion that includes the following: – Issuer/ID of Delegated Signer X.509v3 signing certificate, – Issuer/ID of Authorized Signer X.509v3 signing certificate, – Start and End date of assertion, – Right to sign is delegated; Authorized Signer signs the Delegation of Rights assertion using the XAdES-X-L standard syntax; The resultant signed Delegation of Rights Assertion is the Delegation of Rights Artifact. Creating a Delegation of Rights Artifact

The sdtc:signatureText element is an ED data type and permits the definition of a thumbnail to provide a human readable version of the Digital Signature: – – The thumbnail text string SHOULD contain the following elements for an Authorized Signer: “Digitally Signed by Authorized Signer” – The thumbnail text string SHOULD contain the following elements for a Delegated Signer: “Digitally signed by Delegated Signer ” – Signers name – Date and time of signature – Role – Purpose – Delegated right to sign by with Name of the right delegator Example Text (Authorized Signer): Digitally signed by Authorized Signer John Doe on 4/21/2013 at 15:30 EDT as Physician for the purpose of Author’s signature. Example Text (Delegated Signer): Digitally signed by Delegated Signer John Doe on 4/21/2013 at 15:30 EDT as Physician for the purpose of Co-author’s signature. Delegated right to sign by Jane Doe. SignatureText Specification

CDA Header Shows the CDA containing a header and a body, with the key header elements on the right including participation types, some of which are optional but are included for illustrative purposes.

Authenticator Shows the header elements, and on the right the authenticator element which contains four important top-level tags under it.

SignatureText The sdtc:signatureText tag contains the ds:Signature tag, which further contains the ds:Object tag. The ds:Object tag contains the XAdES elements. Further nested under the ds:Object tag is QualifyingProperties tag, which contains both SignedProperties and UnsignedProperties.

SignerRole Within SignedProperties, there is the SignedSignatureProperties tag, which contains the SignerRole tag. This tag indicates the role of the Authorized Signer. The SignerRole tag can either contain a ClaimedRoles or CertifiedRoles tag. The ClaimedRoles tag contains the ClaimedRole tag, which is used to specify the asserted role of the signer using the Healthcare Taxonomy Code Set. In this example, the code is set to Trauma Surgery (2086S0127X). Role can also be indicated using CertifiedRoles, however the CertifiedRole tag calls for a base64encrypted data type.

SignaturePurpose Within SignedSignatureProperties, we can also indicate the SignaturePurpose using the ASTM E-1762 code set – in this case, to provide more granularity and clarity as to the Signer’s role. In this example, the Signer indicates he/she is signing as a coauthor.

Questions?

HL7 Records Management and Evidentiary Support Profile (RMES)

Testimony HIT PC Feb 2013 Chad P. Brouillard, Esq. – Healthcare Attorney – Foster & Eldridge, LLP Michelle L. Dougherty, MA, RHIA, CHP – Director of Research & Development – AHIMA Foundation Donald T. Mon, PhD – Senior Director – Center for Advancement of Health Information Technology (CAHIT)

Source Reliability Provenance Metadata for Record Life Cycle Events Metadata Criticality: Provides assurance that the record was created and maintained in a legitimate manner as well as supporting information integrity. Realm-Specific Guidance: Ex: The American Bar Association has resources on metadata for establishing digital record provenance. Secondary Use Validation: In addition to support for information integrity, metadata also provides a mechanism for data analytics and forensics to occur. EHR systems have metadata and audit records, but there is not a standard baseline of minimal features found in all EHR applications. There are not consistent definitions or applications of metadata across all EHR applications making data analytics very difficult.

Validity’s Objective The medical record as a credible source supporting patient care and as evidence detailing care delivery and decision making. For information created and maintained in computer systems, additional attributes are important to ensure validity and trustworthiness of the information and records including processes for maintaining the system, procedures for entry and retrieval of information, assurances for the reliability and accuracy of the information, and validation that information has not been altered.

Recommendations Include on DPROV objectives (and task timelines) that Source Reliability required for Interoperability Simplify Source Reliability uptake by using RMES principles as built into EHR-FM R2 RI and TI sections Summary: Reconciling concepts and vocabularies of Source Reliability with Interoperability (esp. Access Controls) will invest DPROV with necessary requirements for achieving national policy objectives for HIT.

Support Team and Questions Please feel free to reach out to any member of the Data Provenance Support Team: Initiative Coordinator: Johnathan Coleman: OCPO Sponsor: Julie Chua: OST Sponsor: Mera Choi: Subject Matter Experts: Kathleen Conner: and Bob Yencha: Support Team: – Project Management: Jamie Parker: – Use Case Development: Atanu Sen: – Harmonization and Standards Development Support: » Alex Lowitt: » Atanu Sen: » Perri Smith: – Support: Lynette Elliott: and Apurva Dharia: