Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments April 30, 2013.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Legal Work Group Developing a Uniform EHR/HIE Patient Consent Form.
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
NAU HIPAA Awareness Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Health IT Privacy and Security Policy Jodi Daniel, J.D., M.P.H. Director, Office of Policy and Research, Office of the National Coordinator for Health.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
Project Proposal to IHE: Implementation Guide for Data Segmentation For Privacy (DS4P) over REST Submitted by S&I Framework Data Segmentation for Privacy.
Security Controls – What Works
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
August 12, Meaningful Use *** UDOH Informatics Brown Bag Robert T Rolfs, MD, MPH.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Privacy and Security Tiger Team Subgroup Discussion: MU3 RFC July 29, 2013.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Privacy and Security Tiger Team Today’s Discussion: Non-Targeted Query Virtual Hearing Testimony July 10, 2013.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
Request for Comment Summary Health IT Policy Committee February 20, 2013.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange February 21, 2013.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 12, 2013.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
1 Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topics Governance RFI Prioritized Questions June 4, 2012.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments Summary April 15, 2013.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange March 18, 2013.
Working with HIT Systems
Larry Wolf Certification / Adoption Workgroup May 13th, 2014.
Is HIPAA Ready for the EHR? Practical and Legal Considerations of the Interoperable Electronic Health Record Barry S. Herrin, CHE, Esq. Smith Moore LLP.
HIT Standards Committee Overview and Progress Report March 17, 2010.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Draft Provider Directory Recommendations Begin Deliberations re Query for Patient Record NwHIN Power Team July 10, 2014.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
HITPC Meaningful Use Stage 3 RFC Comments July 22, 2013 Information Exchange Workgroup Micky Tripathi.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
Provider Directories Tasking, Review and Mod Spec Presentation NwHIN Power Team April 17, 2014.
Data Gathering HITPC Workplan HITPC Request for Comments HITSC Committee Recommendations gathered by ONC HITSC Workgroup Chairs ONC Meaningful Use Stage.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Query Health Operations Workgroup Standards & Interoperability (S&I) Framework October 13, :00am – 12:00pm ET.
Project Proposal to IHE IHE ITI Representational State Transfer (REST) Transport Implementation Guide for Data Segmentation for Privacy (DS4P) Submitted.
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
HIPAA Security Standards Final Rule
Enforcement and Policy Challenges in Health Information Privacy
Making Your IRBs and Clinical Investigators HIPAA-Ready
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Presentation transcript:

Privacy and Security Tiger Team Today’s Discussion: Query/Response Scenarios for Health Information Exchange and MU3 RFC Comments April 30, 2013

Agenda Next steps re: Query/Response Scenario 3 Discussion of MU3 RFC Privacy and Security Comments 2

Scenario 3: Non-Targeted Query for Direct Treatment Purposes Assumes patient’s previous providers are not specifically known, so this is an initial query to find the locations of a patient’s record(s). May require use of an aggregator service (such as a record locator, data element access service, master patient or health information exchange) to find possible sources of record. 1) Should patients have meaningful choice re: whether or not they are included in an aggregator service that permits queries from external providers? Yes. 3

Scenario 3: Non-Targeted Query for Direct Treatment Purposes 2) Should querying entities be required to limit queries (e.g. by geography, list of providers, etc.)? The Policy Committee has already approved recommendations from the Tiger Team on queries that include providing individuals with meaningful choice re: listing with an aggregator service; requiring the use of audit logs for queries which must be provided to patients upon request; and creating an environment where providers can have reasonable assurance for responding to external queries, consistent with their professional ethical and legal obligations. Assuming these recommendations are adopted, the Tiger Team sees no need at this time to establish additional policy to place limits on queries. We may decide to revisit this issue if other recommendations are not adopted and/or nationwide query models increase. (Today, many non-targeted query models are naturally limited by geography.) 4

MU3 RFC Comments The Tiger Team’s goal is to determine if there are relevant policy considerations to discuss, based on the feedback received from the MU3 Request for Comments period, and whether previous Tiger Team recommendations address the questions. In addition, it should determine whether particular questions assigned to the Tiger Team would be better served by a discussion and response by the HIT Standards Committee and its Privacy and Security Workgroup. Goal is to finalize recommendations for MU3. 5

PSTT01 Summary How can the HITPC’s recommendation be reconciled with the National Strategy for Trusted Identities in Cyberspace (NSTIC) approach to identification which strongly encourages the re- use of third party credentials? Straw Response: The Tiger Team reiterates its recommendations on identity proofing and authentication of provider users. In summary, the Tiger Team recommended multi-factor authentication for remote access to PHI and identifying any other access environments that may require multi-factor identity authentication. Identify proofing should be done in compliance with HIPAA. ONC should update policies based on technological improvements and its work should continue to be informed by NSTIC, taking into account provider workflow needs and impacts on healthcare quality and safety.** 6 PSTT01 Summary: Re-use of 3rd Party Credentials **Source: Sept 2012 HITPC Recommendations to ONC

PSTT02 Summary How would ONC test the HITPC’s recommendation (for two-factor authentication) in certification criteria? Straw Response: As the question does not request a policy-based response, the Tiger Team believes this question would be best answered by the HITSC Privacy and Security Workgroup. 7 PSTT02 Summary: Certification Criteria for Testing Authentication

PSTT03 Summary Should ONC permit certification of an EHR as stand-alone and/or an EHR along with a third-party authentication service provider? Straw Response: The question of EHR certification would be best addressed by the HITSC Privacy and Security Workgroup. 8 PSTT03 Summary: EHR Certification - Standalone or

PSTT04 Summary What, if any, security risk issues (or Health Insurance Portability and Accountability Act (HIPAA) Security Rule provisions) should be subject to Meaningful Use attestation in Stage 3? Straw Response: Meaningful Users of EHRs should be required to attest that they have complied with the HIPAA Security Rule training requirements. Question: Should this be in lieu of, or added to, the existing attestation requirements (completion of security risk assessment and addressing encryption of data at rest)? 9 PSTT04 Summary: MU Attestation for Security Risks

PSTT05 Summary Is it feasible to certify the compliance of EHRs based on the prescribed [ASTM] standard for [audit logs]? Straw Response: The Tiger Team suggests that the HITSC Privacy and Security Workgroup address whether it is feasible to certify compliance of EHRs with the prescribed ASTM audit log standard. 10 PSTT05 Summary: Certification Standard for Audit Logs

PSTT06 Summary Is it appropriate to require attestation by meaningful users that such logs are created and maintained for a specific period of time? Straw Response: The HIPAA Security Rule does not require that audit logs are maintained for a specific period of time. Consequently, the Tiger Team does not see a reason to require additional policy specifying a timeframe. Covered entities will make their own decisions on audit trail maintenance periods based on their internal policies; consequently, the HITSC Privacy & Security Workgroup should decide whether any EHR technical requirements are needed to meet entities’ needs. 11 PSTT06 Summary: Attestation for Length of Time Logs

PSTT07 Summary Is there a requirement for a standard format for the log files of EHRs to support analysis of access to health information access multiple EHRs or other clinical systems in a healthcare enterprise? Straw Response: The HIPAA Security Rule does not require any particular audit trail format. As with the previous question, the HITSC Privacy and Security Workgroup can determine whether any EHR technical requirements are needed to meet covered entities’ needs. 12 PSTT07 Summary: Standard Format for Log Files

PSTT08 Summary Are there any specifications for audit log file formats that are currently in widespread use to support such applications? Straw Response: The HIPAA Security Rule does not require any particular format. As with the previous question, the HITSC Privacy and Security Workgroup can determine whether particular specifications should be required for EHR certification. 13 PSTT08 Summary: Audit Log File Specifications

MU4 Summary Some federal and state health information privacy and confidentiality laws, including but not limited to 42 CFR Part 2 (for substance abuse), establish detailed requirements for obtaining patient consent for sharing certain sensitive health information, including restricting the recipient’s further disclosure of such information. Three questions were put forth. 14 MU4 Summary: Patient Consent

MU4 Summary 1)How can EHRs and HIEs manage information that requires patient consent to disclose so that populations receiving care covered by these laws are not excluded from health information exchange? 2)How can MU help improve the capacity of EHR infrastructure to record consent, limit the disclosure of this information to those providers and organizations specified on a consent form, manage consent expiration and consent revocation, and communicate the limitations on use and restrictions on re-disclosure to receiving providers? 3)Are there existing standards, such as those identified by the Data Segmentation for Privacy Initiative Implementation Guide, that are mature enough to facilitate the exchange of this type of consent information in today’s EHRs and HIEs? 15 MU4 Summary: Patient Consent

MU4 Summary Straw Response The Tiger Team has deferred further discussion on data segmentation** until it has received an update on the DS4P Initiative pilot projects. 16 MU4 Summary: Patient Consent **Source: Sept 2010 HITPC Recommendations to ONC

Tiger Team Next Steps Privacy and Security Re: Cloud Computing Right of Access in an Electronic Environment 17

BACK-UP Query/Response 18

MU Stage 3 Request for Comment: Privacy and Security Summary HITPC Privacy & Security Tiger Team Kathryn Marchesini, JD

PSTT01 - How can the HITPC’s recommendation be reconciled with the National Strategy for Trusted Identities in Cyberspace (NSTIC) approach to identification which strongly encourages the re-use of third party credentials? 41 comments received Many comments state that strong identity proofing and multi-factor authentication should be required for MU3 and that the NSTIC Model can be adopted in healthcare –Existing standards such as NIST SP , CIO Council Guidance, FEMA, and OMB, and DEA standards are suggested for consideration Some comments do not believe that multi-factor authentication should be required for MU3 citing that: –The deadline to implement is unrealistic –The requirement would introduce burden and increased costs, especially on small providers –Multi-factor authentication is not a core competency of EHRs Office of the National Coordinator for Health Information Technology 20 PSTT01 Summary: Re-use of 3rd Party Credentials

PSTT02 - How would ONC test the HITPC’s recommendation (for two-factor authentication) in certification criteria? 26 comments received Comments suggest possible approaches including: –Developing a checklist to verify the system set-up, while also requiring appropriate documentation –Requiring vendors to attest to having an architecture that supports third-party authentication and demonstrate examples –Checking for use of a federation language standard –Developing a model audit protocol for the community to use to self-test –Developing an iterative and phased testing program covers the population of organizations Existing standards and guidance that could be the basis of test procedures include: –DEA Interim Final Rule (IFR) –NIST –FIPS 201 –HSPD-12 –NSTIC/Identity Ecosystem Accreditation Standards One comment suggests that the domain is not mature enough for certification Office of the National Coordinator for Health Information Technology 21 PSTT02 Summary: Certification Criteria for Testing Authentication

PSTT03 - Should ONC permit certification of an EHR as stand-alone and/or an EHR along with a third-party authentication service provider? 30 comments received Many comments support both models Several comments suggest the EHR and third-party authentication service be certified independently of each other Logistic suggestions for the two models include: –Third-party dependencies could be handled the same way that database and operating system dependencies are handled in sectors such as the Payment Card Industry –In lieu of requiring certification ONC could implement NSTIC –Certification could be carried out to an ONC recognized healthcare trust framework by an NSTIC Accreditation Authority –Use external labs capable of and experienced in testing identity and authentication technologies in accordance with FIPS 201 for third party authentication providers Office of the National Coordinator for Health Information Technology 22 PSTT03 Summary: EHR Certification - Standalone or

PSTT04 - What, if any, security risk issues (or Health Insurance Portability and Accountability Act (HIPAA) Security Rule provisions) should be subject to Meaningful Use attestation in Stage 3? 46 comments received Workforce security training: –Comments for - cite the importance of the workforce in keeping health information secure –Comments against - cite attestation is either burdensome or duplicative of the HIPAA Security Rule Safeguard and training areas to emphasize include: –Access controls –Audits –Data integrity –Encryption –Identity management –Implementation of backup and recovery plans –Policies and procedures related to prevention of local PHI storage –Malware on all workstations accessing EHRs and EHR modules –Social media, bring your own device (BYOD), and mobile devices –Local data storage security controls Some comments say more HIPAA Security Rule guidance and education is needed for providers Office of the National Coordinator for Health Information Technology 23 PSTT04 Summary: MU Attestation for Security Risks

PSTT05 - Is it feasible to certify the compliance of EHRs based on the prescribed [ASTM] standard for [audit logs]? 30 comments received Majority of comments state prescribed standard is feasible Many comments focus on whether or not there should be a standard –Many comments suggest there should not be a standard yet –Some comments suggest MU standards premature until final Accounting of Disclosures Rule issued –Some comments say question implies combining audit log and accounting of disclosures requirements Audit logs require more information than necessary for an accounting of disclosures Office of the National Coordinator for Health Information Technology 24 PSTT05 Summary: Certification Standard for Audit Logs

PSTT06 - Is it appropriate to require attestation by meaningful users that such logs are created and maintained for a specific period of time? 37 comments received Comments suggest waiting until the Accounting of Disclosures Rule requirements are finalized before addressing attestation Comments supporting attestation also suggest other audit log requirements –Be able to certify a separate audit log system –Rely on NIST/Federal or State regulation –Incorporate into risk assessment –Credential users –Base on standards that give guidance for content –Specify period of time –Identify a minimum data set Other comments suggest attestation to all requirements in the HIPAA Privacy and Security Rules Office of the National Coordinator for Health Information Technology 25 PSTT06 Summary: Attestation for Length of Time Logs

PSTT06 Summary Majority of comments are neutral toward attestation requirements, citing a need to: –Wait for final Accounting of Disclosures Rule –Complete additional feasibility studies/research –Leverage audit log requirements in other industries –Defer to providers and hospitals for feedback Some comments do not support attestation requirements, citing: –Administrative burden –Need to also require demonstrating function –No improvement to security –Audit log is functionality of EHR, not a provider attestation requirement Office of the National Coordinator for Health Information Technology 26 PSTT06 Summary: Attestation for Length of Time Logs are Maintained

PSTT07 - Is there a requirement for a standard format for the log files of EHRs to support analysis of access to health information access multiple EHRs or other clinical systems in a healthcare enterprise? 32 comments received Many comments state that there is no adequate standard format requirement Most comments support a need for standard format requirement Some comments are neutral toward standard format requirement, suggesting that: –Government should dictate what but not how –Variability on details captured presents a challenge to creating a standard –Use of SIEM standard Some comments disagree with need for standard format requirement –Requirement elements can be mandated and should define a minimum data set –Burden on health care organizations and vendors Some comments state there is no need for MU based standards related to Accounting of Disclosures Rule Office of the National Coordinator for Health Information Technology 27 PSTT07 Summary: Standard Format for Log Files

PSTT08 - Are there any specifications for audit log file formats that are currently in widespread use to support such applications? 37 comments received Some comments mention specifications that could be considered for audit log purposes, such as: –IHE ATNA Specification –HL7 –DICOM –ASTM E E –World Wide Web Consortium (W3C) –SYSLOG –UNIX-based operating systems Some comments state there are no existing standards or no existing standards in widespread use Other comments oppose new MU requirements based on proposed rule Office of the National Coordinator for Health Information Technology 28 PSTT08 Summary: Audit Log File Specifications

MU4: Some federal and state health information privacy and confidentiality laws, including but not limited to 42 CFR Part 2 (for substance abuse), establish detailed requirements for obtaining patient consent for sharing certain sensitive health information, including restricting the recipient’s further disclosure of such information. Three questions were put forth. 74 comments received Question 1: How can EHRs and HIEs manage information that requires patient consent to disclose so that populations receiving care covered by these laws are not excluded from health information exchange? –Approaches suggested include: Metadata tagging Data segmentation, such as… –Data Segmentation for Privacy Initiative –VA/SAMHSA –SATVA –Concerns expressed: The necessary segmentation capabilities do not exist today It is better to focus on identifying and punishing inappropriate use of data Use PHR to give patients control of their data Office of the National Coordinator for Health Information Technology 29 MU4 Summary: Patient Consent

MU4 Summary Question 2: How can MU help improve the capacity of EHR infrastructure to record consent, limit the disclosure of this information to those providers and organizations specified on a consent form, manage consent expiration and consent revocation, and communicate the limitations on use and restrictions on re-disclosure to receiving providers? –Create and adopt standards to improve the capacity of EHR infrastructure –Create standardized fields for specially protected health information –Require all certified EHRs manage patient consent and control re-disclosure Question 3: Are there existing standards, such as those identified by the Data Segmentation for Privacy Initiative Implementation Guide, that are mature enough to facilitate the exchange of this type of consent information in today’s EHRs and HIEs? –Many comments call attention to segmentation-related initiatives that might be leveraged, such as: S&I Framework’s Data Segmentation for Privacy Initiative (DS4P WG) HL7 confidentiality and sensitivity code sets SAMHSA/VA pilot eHI developed the “eHealth Initiative Blueprint: Building Consensus for Common Action” Office of the National Coordinator for Health Information Technology 30 MU4 Summary: Patient Consent