Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
How not to get lost in the Big Ocean of Portable Electronic Health Records: Riding the Wave of Digital Health Information Spring Conference April 4, 2008 Gary Beatty President EC Integrity, Inc Vice-Chair ASC X12 Need to reduce the cost of health care Increase quality of health care Consumer driven health care Online health records Payer support for community health records Transparency in health care Pay for performance programs Governmental EMR HR EHR PHR CCR PHI Hybrids Health Records (AHIMA) The legal business record for a healthcare organization. Individually identifiable information Any medium Collected, processed, stored, displayed Health Records contain Diagnosis Medications Procedures Problems Clinical Notes Diagnostic Results Images Graphs Other items deemed necessary Health Records Support continuity of care Planning patient care Provides planning information Resource allocation Trend analysis Forecasting Workload management Justification for billing information Electronic Medical Record (EMR) (HIMSS) An application environment composed of: Clinical Data Repository (CDR) Clinical Decision Support (CDS) Controlled medical terminology Order entry Computerized provider order entry Pharmacy Clinical document applications Enterprise support Inpatient and Outpatient Use to document, monitor and manage delivery of health care Electronic Medical Record (EMR) (HIMSS) The EMR is the legal record Owned by the Care Delivery Organization (CDO) Electronic Health Record (EHR) (HIMSS) Longitutal electronic medical record across encounters in any care delivery setting. Resource for clinicians Secure Real-time Point-of-care Patient centric information source Aids collection of data for other uses Billing Quality management Outcomes reporting Resource planning Public health disease surveillance Reporting Electronic Health Record (EHR) (HIMSS) Includes: Patient demographics Progress notes Problems Medications Vital signs Past medical history Immunizations Laboratory data Radiology reports Electronic Health Record (EHR) (HIMSS) Automates / streamlines clinicians workflow Complete record of clinical encounter Supports other care-related activities Evidence-based decision support Quality management Outcome reporting Personal Health Record (PHR) Created by the individual Summarizes health and medical history Gathered from many sources Format of PHR Paper Personal computer Internet based Portable storage Continuity of Care Record (CCR) Patient Health Summary Standard ASTM / MMS / HIMSS / AAFP / AAP co- development Core health care components Sent from one provider to another Includes Patient demographics Insurance information Diagnosis and problem Medications Allergies Care plan Hybrid Health Record Both Paper health records Electronic health records Protected Health Information (PHI) Any health care information linked to a person Health Status Provision of Health Care Payment of Health Care Includes •Names •Geographic subdivision smaller than a state •Dates related to an individual •Phone Numbers •Fax Numbers •Email Addresses •SSN •Medical Record Numbers •Beneficiary Numbers •Account Numbers •Certificate/license numbers; • Vehicle identifiers and serial numbers • license plate numbers • Device identifiers and serial numbers • Web Universal Resource Locators (URLs) • Internet Protocol (IP) address numbers • Biometric identifiers • Finger • voice prints • Full face photographic images and any comparable images • Any other unique identifying number, characteristic, or code Privacy Authentication Did it arrive exactly as sent? Non-repudiation of receipt How do I know who sent it? Data Integrity Can anyone else read it? Can the receiver deny receipt? How do I know it got there? How do I track these activities? Internet / Intranet Wired Wireless Wifi (802.11a, b, g, i, n) Bluetooth (Personal Area Network - PAN) VoiP Dial-up Mobile Devices Smart Phones Mobile Standards (GSM, GPRS, etc.) PDA Tablet PC’s Physical Media Magnetic, optical, flash (thumb drives), others RC4 (ARC4 /ARCFOUR) – Stream Cypher (easily broken) Secure Sockets Layer (SSL) WEP Wire Equivalent Privacy WPA WiFi Protected Access WPA2 (based upon 802.11i) Data Encryption Standards (DES) Advanced Encryption Standards (AES) Government strength encryption Firewall machines IP address selection ID + Passwords Security techniques Encryption Digital Signatures Data Integrity Verification Non-repudiation Trading Partner Agreements (TPA) CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER PRIVATE KEY n * (n-1) / 2 keys to manage 100 users would require 4950 keys Key size 128 bits Generally considered fast Gary Alice Julie Karen Frank Erin Dale Mary CYPHERTEXT PLAINTEXT DOCUMENT ENCRYPT DECRYPT PROVIDER PLAINTEXT DOCUMENT PAYER PAYER’S PUBLIC KEY PAYER’S PRIVATE KEY n key pairs needed for n partners key size (128, 768, 1024, 2048 bits) Generally considered slower What happens if you lose your key? Gary Alice Julie Public Key Directory Gary Alice Frank Erin Frank Mary Dale Karen Julie Erin E F G H Karen Dale Mary A digitized signature is a scanned image A digital signature is a numeric value that is created by performing a cryptographic transformation of the hash of the data using the “signer’s” private key. Ö m25_ +¦_+_ò`_^5w+A___enruƒ•\ƒ½PÑ7 »q*++•¤Gß_¿_°;·Ae¦_7¦?ââá+H¶¥-÷•90Y å+£ú'¦Æ<§_8óX`p¡ì•É_V+1^ª+ ¦%Gary A. Beatty <[email protected]> Part of the digital signature process A secure one way hashing algorithm used to create a hash of the data PROVIDER A EHR Provider B PUBLIC KEY Encoded Provider B Cypher PROVIDER A PRIVATE KEY Cypher Encoded PROVIDER A PUBLIC KEY EHR Provider B PRIVATE KEY AS1 – Applicability Statement 1 Email exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses SMTP (Simple Mail Transfer Protocol) Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed Email capability Electronic Transaction Digital Certificate AS2 – Applicability Statement 2 HTTP exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses HTTPS Hypertext Transfer Protocol over Secure Socket Layer Allows for REAL TIME delivery Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed Web Server (static IP address) Electronic Transaction Digital Certificate AS3 – Applicability Statement 3 FTP exchange of electronic transactions S/MIME – Secure Multi-Purpose Internet Mail Extensions Uses FTP – File Transfer Protocol Allows for REAL TIME delivery Satisfies Security Requirements Encryption Authentication Integrity Non-repudiation What’s needed FTP Server Electronic Transaction Digital Certificate Electronic Credit Card Issues by Credential Authority Establishes “Credentials” for electronic transactions Name Serial Number Expiration Dates Certificate Holder’s Public Key Digital Certificate of Certification Authority Verified by Registration Authority X.509 Standards Registry of Digital Certificates Access with HIPAA Identifiers We can secure transmission of data! Weakest link – usually when data is AT REST! Paper On the screen Waste baskets Physical Security Building access Data Center access Electronic Security Screen Savers Auto Logoff Spring Conference April 4, 2008 Gary Beatty President EC Integrity, Inc Vice-Chair ASC X12