SlideShare a Scribd company logo
James Williams – Ontario Telemedicine Network
Objectives:
1. Review policy constraints for EHR systems.
2. Traditional approaches to policies in EHRs.
3. CHI consent management architecture.
4. Current research.
Focus:
 Policies pertaining to personal health information.
 Policies may touch upon:
 Consent directives.
 Acceptable uses.
 Permissible disclosure.
 Appropriate safeguards.
 Emergency overrides.
 Retention.
Sources of Policy:
1. Statutes and regulations
2. Case law
3. Codes of conduct
4. Corporate bylaws
5. Professional guidelines / best practices
6. First Nations Sovereignty
Statutes: Privacy
 The most important legislative instruments are the
various privacy and health information statutes.

 Privacy legislation in Canada is based on a set of fair
information practices:
1) Accountability 6) Accuracy
2) Identifying purposes 7) Safeguards
3) Consent 8) Openness
4) Limiting collection 9) Individual access
5) Limiting use, disclosure, retention. 10) Challenging compliance
Statutes:
 Establish a basic rule, and then add exceptions.
 For example, express consent is generally required in
order to disclose information to a third party. But:
 Emergency situations.
 Law enforcement.
 Public health.
 Eligibility for benefits.
 Risk to third party.
Statutes: Private sector privacy laws
Statutes: Health information laws
Statutes: additional laws
 Federal:
 Statistics Act.
 Quarantine Act.
 Provincial:
 Child Protection Act.
 Communicable Disease Act.
 Health Act.
 Worker’s Compensation Act.
 Mental Health Act.
Other sources
 Case Law:
 Eg: Patient has right of access to their own health record.
(McInerney v MacDonald).
 Codes of Conduct:
 Eg: Canadian Medical Association, Health Information Privacy
Code (1998).
 Corporate bylaws:
 Hospital policies and procedures.
 Municipal Information Acts.
 Best Practices
 COACH Guidelines for the Protection of Health Information.
Sources: OCAP
 Ownership:
 information is owned collectively by the Nation.
 Control:
 the Nation retains control over all aspects of
information management.
 Access:
 the Nation has a right to manage and make decisions
regarding access to their collective information.
 Possession:
 a mechanism to assert ownership.
The inter-provincial view:
Interoperability:
Some Issues:
 Custodians disclosing PHI are generally under a duty to ensure
that the receiving jurisdiction has ‘comparable safeguards’.
 Patients may issue consent directives. Ontario imposes a ‘duty
to notify’ receiving custodians about these.
 Patients should be able to avail themselves of additional
protections in the new jurisdiction.
 Who now has control of the information?
 Consent directives are also sensitive.
More issues:
 Even if we have a way to solve these issues, one of the
major problems is that laws (etc) are dynamic.
Challenge:
 How do we manage policies in a multi-EHR setting?
 Traditional route has been to either purchase COTS
products, or to develop systems for a particular
jurisdiction. (Hard coded business rules).
CHI’s Consent Directives Management System
 Applies constraints prior to providing access or
transmitting PHI.
 Allows consent directives at various levels of
granularity.
 Relies on common privacy vocabulary to apply
consent requirements.
 Can store with EHRi data, or in consolidated form.
Processing Consent Directives in a Jurisdiction
1. Transfer consent directives from clinical applications
to the EHR.
2. Let either the EHR or (sending clinical application)
process consent directives prior to disclosing a
patient’s PHI.
3. Transfer consent directives from EHR to clinical
applications whenever PHI is disclosed from the
EHR.
Want to avoid having too many consent directives
management systems.
Interjurisdictional Transfer
 Consent directives will be processed whether an access
request is received from a POS system, or clinical
portal, or from an EHR in another jurisdiction.
 Jurisdictions need to agree upon and set policies as to
how consent directives made in one jurisdiction will be
managed following disclosure to another.
 A nationally adopted messaging schema is required for
conveying consent directives between jurisdictions.
Interjurisdictional Transfer (2)
Several goals must be achieved before policy
enforcement can be automated by a policy
management service:
 Jurisdictional policies must be harmonized.
 Rules must be captured and codified.
 Special support for changes to rules.
 Common vocabultary.
Data containing consent directives may flow from one
jurisdiction to another, but policy related data does
not.
Can we do better?
 The inter-jurisdictional data transfer problem is
complex.
 Can we bring some technical tools to bear on the
problem?
 Representing policy rules.
 Operationalizing the representations.
 Storing and securing the representations.
 Managing the representations through their lifecycle.
 Verification and validation.
Current work:
 There has been quite a bit of work on representing policies
and regulations.
 L.Cranor, M. Langehreich, M. Marchiori, J. Reagle, The
Platform for Privacy Preferences (P3P 1.0) Specification.
 R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, An Xpath based
preference language for P3P.
 N. Li, T. Yu, A.I. Anton, A semantics based approach to
privacy languages. (2006)
Current Work
 P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter,
Enterprise Privacy Authorization Language (EPAL 1.1).
 A. Barth, J.C. Mitchell, J. Rosenstein, Conflict and
combination in privacy policy languages (2004).
(DPAL)
 eXtensible Access Control Markup Language.
(XACML)
Current Work
 The above frameworks provide a formalism to specify
data protection policy. They provide methods for
evaluating and enforcing policies.
 Drawback: they are built to manage policies within
single organizations. (Guarda, Zannone, Toward the
Development of Privacy Aware Systems, 2008)
Current Work
 Recent efforts:
 Extend XACML with algorithms addressing issue of policy
similarities and integration across organizations. (Mazzoleni
et al, XACML policy integration algorithms, 2008).
 Distributed temporal logic. (Hilty et al, On obligations, 2005).
 Privacy in Peer to Peer Networks. Automated policy
enforcement. (Weber, Obry).

More Related Content

PPTX
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
PPT
Identity Architecture and Management of Health Information ...
PPT
Standardization and Interoperability
PDF
Dialogue on HIPAA/HITECH Compliance
PPTX
Direct Boot Camp 2 0 IWG Provider Directory Pilots
PPTX
Interoperability in health care information systems
PPT
Sharing EHRs - The Canadian Experience
PPTX
Aman Quadri - Future Trends with Health and Wellness.
Direct Boot Camp 2 0 Federal Agency requirements for exchange via direct
Identity Architecture and Management of Health Information ...
Standardization and Interoperability
Dialogue on HIPAA/HITECH Compliance
Direct Boot Camp 2 0 IWG Provider Directory Pilots
Interoperability in health care information systems
Sharing EHRs - The Canadian Experience
Aman Quadri - Future Trends with Health and Wellness.

What's hot (20)

PPTX
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
PPT
Informatics Standards And Interoperability20090325
PPTX
PDF
Sustainability of HIEs under CyberSecurity
PDF
Healthcare Interoperability and Standards
PDF
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
PPTX
Data Sharing and Release Legislation
PPS
Working together
PDF
ACO Powerpoint for Dr. Cullins
PDF
HIMSS GSA e-Authentication whitepaper June 2007
PPTX
Dart net intro 2015 tw
PPTX
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
PPT
Data systems web_integration_v0 1
PDF
$4.8m HIPAA Breach
PPTX
Investigator-initiated clinical trials: a community perspective
PPT
HL7 for TMI November 2009
PPTX
Protecting Healthcare Data from Hackers
PDF
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
PPT
Interoperability Between Healthcare Applications
PPTX
Architecture and Standards
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Informatics Standards And Interoperability20090325
Sustainability of HIEs under CyberSecurity
Healthcare Interoperability and Standards
ONC – CMS Principles and Strategy for Accelerating Health Information Exch...
Data Sharing and Release Legislation
Working together
ACO Powerpoint for Dr. Cullins
HIMSS GSA e-Authentication whitepaper June 2007
Dart net intro 2015 tw
iHT2 Health IT Summit Atlanta 2013, Michael Matthews, Chief Executive Officer...
Data systems web_integration_v0 1
$4.8m HIPAA Breach
Investigator-initiated clinical trials: a community perspective
HL7 for TMI November 2009
Protecting Healthcare Data from Hackers
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Interoperability Between Healthcare Applications
Architecture and Standards
Ad

Viewers also liked (8)

PPTX
Privacy and Access to Information Law - Lecture 1
PPTX
Social Networks in Health Care - Talk at ICSE 2010
PDF
Web Services PHP Tutorial
PDF
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
PDF
The impact of innovation on travel and tourism industries (World Travel Marke...
PPSX
Reuters: Pictures of the Year 2016 (Part 2)
PDF
The Six Highest Performing B2B Blog Post Formats
PDF
The Outcome Economy
Privacy and Access to Information Law - Lecture 1
Social Networks in Health Care - Talk at ICSE 2010
Web Services PHP Tutorial
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
The impact of innovation on travel and tourism industries (World Travel Marke...
Reuters: Pictures of the Year 2016 (Part 2)
The Six Highest Performing B2B Blog Post Formats
The Outcome Economy
Ad

Similar to CASCON 2009 - Talk on Interoperability (20)

DOCX
Nationwide patient centric consent mgmt - v3 approved for public release old
PPTX
Mha 690 discussion 2 Seynabou
PPTX
fdfceaa4d21065110751105707f3b87c5810 (1).pptx
PDF
TrustArc Webinar - Strategies for Future-Proofing Privacy for Healthcare
PDF
Muiris o'connor
PPT
From Lip-Service to Action: Improving Healthcare Privacy Practices
DOC
Kairon overview
PPTX
Patient confidentiality training
PPTX
Patient confidentiality training
PPT
june_20_2011_presentation_e-health_policy_istrategy.ppt
PDF
Brisbane Health-y data: Privacy and Legal Framework
PPTX
nursing informatics(jennifer vargas)
PPTX
nursing informatics chapter 14,15,16,17
KEY
Final gygax training module_ attempt 2
PPTX
Technology, policy, privacy and freedom
PDF
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
PDF
A12_Beyond_HIPAA_PPT1
PPTX
Standards and Best Practices for Confidentiality of Electronic Health Records
PDF
Case Study “HIE Consumer & Stakeholder Engagement: Privacy and Security of Pa...
DOCX
Documentation in acute care chapter 5
Nationwide patient centric consent mgmt - v3 approved for public release old
Mha 690 discussion 2 Seynabou
fdfceaa4d21065110751105707f3b87c5810 (1).pptx
TrustArc Webinar - Strategies for Future-Proofing Privacy for Healthcare
Muiris o'connor
From Lip-Service to Action: Improving Healthcare Privacy Practices
Kairon overview
Patient confidentiality training
Patient confidentiality training
june_20_2011_presentation_e-health_policy_istrategy.ppt
Brisbane Health-y data: Privacy and Legal Framework
nursing informatics(jennifer vargas)
nursing informatics chapter 14,15,16,17
Final gygax training module_ attempt 2
Technology, policy, privacy and freedom
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...
A12_Beyond_HIPAA_PPT1
Standards and Best Practices for Confidentiality of Electronic Health Records
Case Study “HIE Consumer & Stakeholder Engagement: Privacy and Security of Pa...
Documentation in acute care chapter 5

Recently uploaded (20)

PPTX
2 neonat neotnatology dr hussein neonatologist
PDF
Cardiology Pearls for Primary Care Providers
PPTX
Acute Coronary Syndrome for Cardiology Conference
PDF
focused on the development and application of glycoHILIC, pepHILIC, and comm...
PPTX
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
PPTX
ANATOMY OF MEDULLA OBLANGATA AND SYNDROMES.pptx
PPTX
surgery guide for USMLE step 2-part 1.pptx
PPTX
Cardiovascular - antihypertensive medical backgrounds
PPTX
ONCOLOGY Principles of Radiotherapy.pptx
PPTX
Stimulation Protocols for IUI | Dr. Laxmi Shrikhande
PPTX
y4d nutrition and diet in pregnancy and postpartum
PDF
شيت_عطا_0000000000000000000000000000.pdf
PDF
Intl J Gynecology Obste - 2021 - Melamed - FIGO International Federation o...
PPTX
Electrolyte Disturbance in Paediatric - Nitthi.pptx
PPTX
IMAGING EQUIPMENiiiiìiiiiiTpptxeiuueueur
PPTX
MANAGEMENT SNAKE BITE IN THE TROPICALS.pptx
PPTX
obstructive neonatal jaundice.pptx yes it is
PPTX
Clinical approach and Radiotherapy principles.pptx
PPTX
preoerative assessment in anesthesia and critical care medicine
PPTX
Anatomy and physiology of the digestive system
2 neonat neotnatology dr hussein neonatologist
Cardiology Pearls for Primary Care Providers
Acute Coronary Syndrome for Cardiology Conference
focused on the development and application of glycoHILIC, pepHILIC, and comm...
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
ANATOMY OF MEDULLA OBLANGATA AND SYNDROMES.pptx
surgery guide for USMLE step 2-part 1.pptx
Cardiovascular - antihypertensive medical backgrounds
ONCOLOGY Principles of Radiotherapy.pptx
Stimulation Protocols for IUI | Dr. Laxmi Shrikhande
y4d nutrition and diet in pregnancy and postpartum
شيت_عطا_0000000000000000000000000000.pdf
Intl J Gynecology Obste - 2021 - Melamed - FIGO International Federation o...
Electrolyte Disturbance in Paediatric - Nitthi.pptx
IMAGING EQUIPMENiiiiìiiiiiTpptxeiuueueur
MANAGEMENT SNAKE BITE IN THE TROPICALS.pptx
obstructive neonatal jaundice.pptx yes it is
Clinical approach and Radiotherapy principles.pptx
preoerative assessment in anesthesia and critical care medicine
Anatomy and physiology of the digestive system

CASCON 2009 - Talk on Interoperability

  • 1. James Williams – Ontario Telemedicine Network
  • 2. Objectives: 1. Review policy constraints for EHR systems. 2. Traditional approaches to policies in EHRs. 3. CHI consent management architecture. 4. Current research.
  • 3. Focus:  Policies pertaining to personal health information.  Policies may touch upon:  Consent directives.  Acceptable uses.  Permissible disclosure.  Appropriate safeguards.  Emergency overrides.  Retention.
  • 4. Sources of Policy: 1. Statutes and regulations 2. Case law 3. Codes of conduct 4. Corporate bylaws 5. Professional guidelines / best practices 6. First Nations Sovereignty
  • 5. Statutes: Privacy  The most important legislative instruments are the various privacy and health information statutes.   Privacy legislation in Canada is based on a set of fair information practices: 1) Accountability 6) Accuracy 2) Identifying purposes 7) Safeguards 3) Consent 8) Openness 4) Limiting collection 9) Individual access 5) Limiting use, disclosure, retention. 10) Challenging compliance
  • 6. Statutes:  Establish a basic rule, and then add exceptions.  For example, express consent is generally required in order to disclose information to a third party. But:  Emergency situations.  Law enforcement.  Public health.  Eligibility for benefits.  Risk to third party.
  • 9. Statutes: additional laws  Federal:  Statistics Act.  Quarantine Act.  Provincial:  Child Protection Act.  Communicable Disease Act.  Health Act.  Worker’s Compensation Act.  Mental Health Act.
  • 10. Other sources  Case Law:  Eg: Patient has right of access to their own health record. (McInerney v MacDonald).  Codes of Conduct:  Eg: Canadian Medical Association, Health Information Privacy Code (1998).  Corporate bylaws:  Hospital policies and procedures.  Municipal Information Acts.  Best Practices  COACH Guidelines for the Protection of Health Information.
  • 11. Sources: OCAP  Ownership:  information is owned collectively by the Nation.  Control:  the Nation retains control over all aspects of information management.  Access:  the Nation has a right to manage and make decisions regarding access to their collective information.  Possession:  a mechanism to assert ownership.
  • 14. Some Issues:  Custodians disclosing PHI are generally under a duty to ensure that the receiving jurisdiction has ‘comparable safeguards’.  Patients may issue consent directives. Ontario imposes a ‘duty to notify’ receiving custodians about these.  Patients should be able to avail themselves of additional protections in the new jurisdiction.  Who now has control of the information?  Consent directives are also sensitive.
  • 15. More issues:  Even if we have a way to solve these issues, one of the major problems is that laws (etc) are dynamic.
  • 16. Challenge:  How do we manage policies in a multi-EHR setting?  Traditional route has been to either purchase COTS products, or to develop systems for a particular jurisdiction. (Hard coded business rules).
  • 17. CHI’s Consent Directives Management System  Applies constraints prior to providing access or transmitting PHI.  Allows consent directives at various levels of granularity.  Relies on common privacy vocabulary to apply consent requirements.  Can store with EHRi data, or in consolidated form.
  • 18. Processing Consent Directives in a Jurisdiction 1. Transfer consent directives from clinical applications to the EHR. 2. Let either the EHR or (sending clinical application) process consent directives prior to disclosing a patient’s PHI. 3. Transfer consent directives from EHR to clinical applications whenever PHI is disclosed from the EHR. Want to avoid having too many consent directives management systems.
  • 19. Interjurisdictional Transfer  Consent directives will be processed whether an access request is received from a POS system, or clinical portal, or from an EHR in another jurisdiction.  Jurisdictions need to agree upon and set policies as to how consent directives made in one jurisdiction will be managed following disclosure to another.  A nationally adopted messaging schema is required for conveying consent directives between jurisdictions.
  • 20. Interjurisdictional Transfer (2) Several goals must be achieved before policy enforcement can be automated by a policy management service:  Jurisdictional policies must be harmonized.  Rules must be captured and codified.  Special support for changes to rules.  Common vocabultary. Data containing consent directives may flow from one jurisdiction to another, but policy related data does not.
  • 21. Can we do better?  The inter-jurisdictional data transfer problem is complex.  Can we bring some technical tools to bear on the problem?  Representing policy rules.  Operationalizing the representations.  Storing and securing the representations.  Managing the representations through their lifecycle.  Verification and validation.
  • 22. Current work:  There has been quite a bit of work on representing policies and regulations.  L.Cranor, M. Langehreich, M. Marchiori, J. Reagle, The Platform for Privacy Preferences (P3P 1.0) Specification.  R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, An Xpath based preference language for P3P.  N. Li, T. Yu, A.I. Anton, A semantics based approach to privacy languages. (2006)
  • 23. Current Work  P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter, Enterprise Privacy Authorization Language (EPAL 1.1).  A. Barth, J.C. Mitchell, J. Rosenstein, Conflict and combination in privacy policy languages (2004). (DPAL)  eXtensible Access Control Markup Language. (XACML)
  • 24. Current Work  The above frameworks provide a formalism to specify data protection policy. They provide methods for evaluating and enforcing policies.  Drawback: they are built to manage policies within single organizations. (Guarda, Zannone, Toward the Development of Privacy Aware Systems, 2008)
  • 25. Current Work  Recent efforts:  Extend XACML with algorithms addressing issue of policy similarities and integration across organizations. (Mazzoleni et al, XACML policy integration algorithms, 2008).  Distributed temporal logic. (Hilty et al, On obligations, 2005).  Privacy in Peer to Peer Networks. Automated policy enforcement. (Weber, Obry).

Editor's Notes

  • #6: Accountability. Organizations are accountable for the protection of personal information under their control. Identifying purposes. The purposes for which the personal information is being collected must be identified during or prior to the collection. Consent. Information must be collected with the knowledge and consent of the individual and for a reasonable purpose. Limiting collection. The collection of personal information is to be limited to what is necessary for the identified purposes and be collected by fair and lawful means. Limiting use, disclosure and retention. Information can only be used and disclosed for the purpose for which it is collected and be retained only as long as it is necessary to fulfil the purpose. Accuracy. Information must be as accurate, complete and up-to-date as possible. Safeguards. Information must be protected by adequate safeguards. Openness. Information about an organization’s privacy policies and practices is to be readily available. Individual access. Information must be accessible for review and correction by the individual whose personal information it is. Challenging compliance. Organizations are to provide means to an individual to challenge an organization’s compliance with the above principles.
  • #10: Child protection acts: requirement to disclose potential abuse. Health Act may contain a duty to warn.