Privacy Architecture Considerations Kathleen Connor Fox Systems Inc

  • Slides: 23
Download presentation
Privacy Architecture Considerations Kathleen Connor Fox Systems Inc Opt-In / Opt-Out What Do They

Privacy Architecture Considerations Kathleen Connor Fox Systems Inc Opt-In / Opt-Out What Do They Entail How Standards Support Policy 1

Agenda Statement of Purpose n Brief Introduction to scope the discussion n Participant introductions

Agenda Statement of Purpose n Brief Introduction to scope the discussion n Participant introductions and statement of perspective – short summary of your country’s national health information exchange architecture n Collect Input n 2

Discussion Focus n n Consent Policies and Supportive Privacy Architectures – International Perspectives Purpose

Discussion Focus n n Consent Policies and Supportive Privacy Architectures – International Perspectives Purpose and Goals ¨ Level setting – framework for discourse n E. g. Infoway Privacy and Security Architecture structured and aligned policy and technical requirements ¨ Survey n General structure of health delivery system as context for privacy requirements n Collect basic information n Validate prepopulated information n Would love your participation ¨ Input for report n Identify Consent Requirements, Feasible Technical Solutions, and Best Practices ¨ Initiate ongoing discourse 3

Collection Instrument May need to sample range of Nodes within a country from most

Collection Instrument May need to sample range of Nodes within a country from most stringent to least stringent privacy requirements 4

Presentation Focus n Policy, Standards, and Technical Support for Patient consent to collect, use,

Presentation Focus n Policy, Standards, and Technical Support for Patient consent to collect, use, and disclose PHI ¨ Opt-out n Total n Conditional ¨ Opt-in n Total n Conditional n Within Nodes (Df. =Regional Hubs, Sub-networks) ¨ Share n n n generally agreed upon privacy policies Among Nodes = National Information Network (e. g. , UK Spine, CA EHRi, NL LSP, US NHIN) Role Based Access Standards for electronic consents, shared secrets, privacy policies 5

Opt-out Actively refusing to authorize an entity to collect, use, or disclose PHI n

Opt-out Actively refusing to authorize an entity to collect, use, or disclose PHI n Actively refusing to authorize a requesting entity to access, use or redisclose PHI n May opt-out at the record or data element level n Opt-out may be n ¨ Total ¨ Conditional 6

Opt-out n Total Opt-out ¨ Off Node ¨ Locked/Masked on Node n Conditional Opt-out

Opt-out n Total Opt-out ¨ Off Node ¨ Locked/Masked on Node n Conditional Opt-out ¨ PHI is Masked / Locked ¨ Some collection, use, disclosure permitted n Pre-determined: By User, Role, Context Based Access n Ad-Hoc: By Shared Secret n n Implied Consent = not Opting out Deemed Consent ¨ Public health or legal requirements may override Opt-out 7

Opt-out Non-action = implied consent Conditional Dissent by Data Element Requires active dissent by

Opt-out Non-action = implied consent Conditional Dissent by Data Element Requires active dissent by record / data element May not have a choice where there is a public health issue 8

Opt-in n Actively authorizing an entity to collect, use, or disclose PHI n Actively

Opt-in n Actively authorizing an entity to collect, use, or disclose PHI n Actively authorizing a requesting entity to access, use, or re-disclose PHI n May Opt-in at the record or data element level n Opt-in may be ¨Total ¨Conditional 9

Opt-in Conditional Opt-in ¨PHI is Masked / Locked n Some collection, use, disclosure permitted

Opt-in Conditional Opt-in ¨PHI is Masked / Locked n Some collection, use, disclosure permitted ¨Pre-determined: By User, Role, Context Based Access ¨Ad-Hoc: By Shared Secret n Implied Dissent = not Opting in n Deemed Consent ¨Public health or legal requirements may override Dissent 10

Opt-in Requires active assent by record / data element Non-action = dissent Conditional Assent

Opt-in Requires active assent by record / data element Non-action = dissent Conditional Assent by Data Element May not have a choice where there is a public health issue 11

Opt-in / Opt-out Infrastructure 12

Opt-in / Opt-out Infrastructure 12

Role Based Access Control IHE Basic Patient Privacy Consent Profile 13

Role Based Access Control IHE Basic Patient Privacy Consent Profile 13

RBAC Support 4 Opt-in / Opt-out 14

RBAC Support 4 Opt-in / Opt-out 14

Shared Secret supports Conditional Access that is time limited and may be revoked by

Shared Secret supports Conditional Access that is time limited and may be revoked by the Patient 15

Masking Supports Conditional OPT-IN / OPT-OUT 16

Masking Supports Conditional OPT-IN / OPT-OUT 16

RBAC with support for Masking 17

RBAC with support for Masking 17

RBAC and Masking Issues n n n Mapping User Types to Roles Defining Teams

RBAC and Masking Issues n n n Mapping User Types to Roles Defining Teams Mapping Roles to Authorizations Downstream application of consent parameters Ontology of roles, authorizations, and consent parameters needed for computable interchange Security mechanisms to support time limited, renewable, and revocable shared secret, e. g. , scheduled change of key hash with patient ability to revoke key access 18

NODE 2 NODE via NIN 19

NODE 2 NODE via NIN 19

NIN Support for Consent Standards for electronic representation of Node consent policies and patient

NIN Support for Consent Standards for electronic representation of Node consent policies and patient consents n Computable access to Node consent policies n Computable patient consent transmitted with associated PHI n Standards for computable negotiation of multiple node policies associated with a patient’s PHI n 20

IHE BPPC Masking Use Case n n An Affinity Domain may have jurisdictional or

IHE BPPC Masking Use Case n n An Affinity Domain may have jurisdictional or organizational policies that require support for more complex patient privacy consent policies. These privacy policies may require that a patient explicitly consent to disclosure of protected or sensitive health information to specific entities. To implement such policies using the BPPC profile, an Affinity Domain would include sufficiently explicit functional roles as well as contextual and user specific role information to support these policies. For example, in a jurisdiction that requires explicit patient consent to disclose psychotherapy notes, the Affinity Domain would include a sensitivity marker for psychotherapy notes and may only permit access by the functional role (1) “Named entity”, where the named entity identifier must match the identifier of the named entity in the patient’s associated consent document associated with the patient’s health document; (2) An “unnamed entity” based on a time limited [i. e. , time-bomb] and nontransferrable “shared secret key” supplied to the entity by the patient and authenticated by some algorithm the information in the patient’s associated consent document; or (3) An emergency provider who submits a “break the glass key” administered by the Affinity Domain that has an appropriate audit trail with documentation of the provider’s reason and context for use per Affinity Domain policy. 21

IHE BPPC Use Case cont. n n The psychotherapy notes would be submitted to

IHE BPPC Use Case cont. n n The psychotherapy notes would be submitted to the XDS using the confidentiality code indicating that it is available only to these entities. In addition to document type level sensitivity markers, e. g. , psychotherapy notes, an Affinity Domain may support sensitivity markers for types of health information that might be included in documents of many types. There may be sensitivity markers for any document that includes diagnosis, procedure, medication, location, or provider information which the patient believes may indicate that the patient has genetic, substance use, HIV/AIDs, mental health or other conditions, which the patient wishes to mask. Another use for sensitivity markers is for victims of abuse who wish to mask all records containing their demographic information. 22

HL 7 Confidentiality Vocabulary 23

HL 7 Confidentiality Vocabulary 23