Identity: The Key to the Future of Healthcare
|
|
|
- Cecily Jennings
- 10 years ago
- Views:
Transcription
1 Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011
2 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital deaths due to medical errors every year. Avoids healthcare waste. Up to $300B per year on treatments with no health yield. We spend 2X per capita as any other industrialized nation. We rank last in population health status. Accelerates health knowledge diffusion. Average of 17 years for medical evidence to be integrated into practice. Reduces variability in delivery and access. Access to specialty care is highly dependent on geography. 2
3 Why is Health Information Technology Critical? Promotes public health and preparedness. Surveillance is fragmented, and untimely. Empowers consumer involvement in health management. Patients currently minimally involved in own health decisions. Strengthens health data privacy and protection. Public fear of identity theft and loss of privacy. Healthcare Reform cannot do this without HIT. Paper records cannot solve these problems! 3
4 Evolution of Healthcare Paradigm Patient Clinicians Paper Records Exam Room 4
5 Evolution of Healthcare Paradigm Clinicians Patient Electronic Health Record System Public Health Secure HIE Network External Data Sources Lab Lab Lab Pharmacy Pharmacy Pharmacy Exam Clinical Room Decision Support System Best Practice Rules AHRQ Quality Reports to Clinicians, Payers, And Public Complete the Feedback Loop 5
6 Evolution of Healthcare Paradigm Clinicians Patient Electronic Health Record System Public Health Secure HIE Network External Data Sources Lab Lab Lab Pharmacy Pharmacy Pharmacy Clinical Decision Support System Best Practice Rules AHRQ Quality Reports to Clinicians, Payers, And Public Complete the Feedback Loop 6
7 Future for Healthcare Goal: High quality, cost-effective healthcare. Means: Clinician/Patient direct interaction with Clinical Drivers: HIE + EHR + CDSS => SAVES LIVES and $$$ Interoperable HIE is KEY to Meaningful Use of HIT which, in turn, is KEY to health reform! Requires: EHR (with CDSS and HIE) and: Interoperability with sources of clinical data and sources of computable rules for best clinical practices (Standards). Incentives to incorporate into healthcare practice (Resources). Investigations of systemic failures to enable systems that detect and prevent errors through best practices at the point of decision making. Trust through agreement on standards for interoperable security and privacy (including patient consent). 7
8 Trust Patients must trust the HIE system. Lack of trust = no permission to disclose health records. Providers must trust the HIE system. Lack of trust = no information exchange. Loss of perceived control of PHI in HIE. Trusted provider no longer in charge of data. Access to large amounts of PHI accumulated by HIE. Increased potential for breach which could stop HIE. HIE will fail without access to PHI. Health reform will fail without HIE! Trust depends on believable security mechanisms and a 8
9 Security Requires Assurance of Identity High level of assurance that the person who is sending information is who say they are. Message non-repudiation through electronic signatures. High level of assurance that the person who is receiving information is who we think they are. Including mechanisms to prevent information from being changed or viewed by anyone else through encryption. High level of assurance that the patient identified in the information is who we think they are. Patient identification accuracy. These mechanisms are dependent on high assurance identity proofing and multi-factor authentication. NIST Level 3 assurance now available commercially at reasonable prices. 9
10 Assurance of Patient Identity No national standard for how to uniquely identify patients. HIPAA requirement for standard patient ID was not implemented. Merging records from multiple locations is required. Matching probability is much less than100% -- worse without SSN! Identity proofing of patients is required for security. In-person identity proofing is impractical -- Electronic access to medical records must be secured. Internet access to patient portal is needed to meet consumer Fraud prevention in public programs (e.g., Medicare and Medicaid) requires patient identity to be assured. Electronic recording of consent directives. Must be assured that it is truly the patient who is setting the limits. 10
11 Assurance of Provider Identity Remote access to patient information (HIPAA). Access from home, wireless devices, and patient homes. Access to government held PII. OMB,FISMA, and NIST requirements. Submission of quality information. Pay for performance programs. Meaningful Use incentive programs (CMS). Fraud prevention and enforcement. CMS (Medicare and Medicaid requirements). Electronic prescribing of controlled substances. DEA requirements are very strict. 11
12 DEA IFR for Controlled erx Only a DEA registrant may sign the prescription. DEA regulation effective June 1, To sign, the registrant must complete a two-factor authentication protocol that meets the requirements of NIST Assurance Level 3 and uses two of the following three factors: (1) Something only the practitioner knows, such as a password or response to a challenge question. (2) Something the practitioner is, biometric data such as a fingerprint or iris scan. (3) Something the practitioner has, a device separate from the computer to which the practitioner is gaining access. To obtain an authentication credential the registrant must pass identity proofing that meets the requirements of NIST Assurance Level 3. 12
13 The Problem: Identities are difficult to verify over the internet. Privacy remains a challenge. Numerous government services must be conducted in person or by mail, leading to continual rising costs for state, local and federal governments. Electronic health records forward without solving authentication challenge for providers and individuals. New Yorker, July 5, 1993
14 Usernames and Passwords are Broken Most people have 25 different passwords, or use the same one over and over. Rising costs of identity theft. 123% increase in financial institution Suspicious Activity Reports in last 6 years 11.7 million est. victims over 2 years $17.3 billion est. cost to economy over 2 years Cybercrime is also on the rise Incidents up 22% from 2009 to 2008 Total loss from these incidents up 111%, to $560 million.
15 This is NOT the solution!
16 National Strategy for Trusted Identities in Cyberspace April 2011 NSTIC Guiding Principles Privacy-Enhancing and Voluntary Secure and Resilient Interoperable Cost-Effective and Easy To Use NSTIC calls for an Identity Ecosystem, and organizations will be able to trust each other because they follow agreed upon standards to obtain
17 NSTIC calls for: Private sector will lead the effort Not a government-run identity program Industry is in the best position to drive technologies and solutions Can identify what barriers need to be overcome Federal government will provide support Help develop a private-sector led governance model Facilitate and lead development of interoperable standards Provide clarity on national policy and legal framework around liability and privacy Act as an early adopter to stimulate demand
18 Next Steps for NSTIC Convene Private Sector Workshops on governance, privacy and technology FY11 Focus Establish Governance model Private sector led; multi-stakeholder collaboration Enable expedited focus on consensus standards and operating rules Explore models for addressing liability Design Pilots: Develop criteria for selection Assess potential programs Prepare for formal pilot launches with funding in FY12 Government as an early adopter to stimulate demand Ensure government-wide alignment with the Federal Identity, Credential, and Access Management (FICAM) Roadmap Increased adoption of Trust Framework Providers (TFP)
19 NIST IR TABLE OF CONTENTS Security Architecture Design Process for Health Information Exchanges (HIEs) September EXECUTIVE SUMMARY 2.0 INTRODUCTION 3.0 HIE CONTEXTS 4.0 HIE SECURITY ARCHITECTURE DESIGN PROCESS 5.0 CAPSTONE POLICIES 6.0 ENABLING SERVICES 7.0 ENABLING PROCESSES 8.0 NOTIONAL ARCHITECTURE 9.0 TECHNOLOGY SOLUTIONS AND STANDARDS 10.0 BUILDING A NATIONWIDE HIE USING REGIONAL HIES 19
20 ENABLING SERVICES Risk Assessment Entity Identity Assertion (Authentication) * Credential Management (Licenses, etc.) * Access Control (Authorization) * Privilege Management (Roles, Permissions) * Collect and Communicate Audit Trail Document Integrity (Hash and Electronic Signature) * Secured Communication Channel Document Confidentiality (Encryption) * De-identification Non-Repudiation of Origin (Electronic Signature) * Identity Dependent Services (8 of 12) Manage Consent Directives (Assured Patient Identity) * 20
21 Full Range of Identity Services Registration Data Collection and/or Integration Identity Proofing Record Matching / Identity Cleanup Entity Proofing + association with responsible individual(s) Individual Proofing = carbon-based life form, species homo sapiens Electronic Identity Tokens and Processes Electronic Signature, PKI Keys, Authentication Tokens Hashing, Encrypting, Signing, and Authenticating Documents Attribute Associations Credentials (Licenses, privileges, etc.) Identity Authentication multiple levels and methods available High Level of Assurance (NIST Level 3) Required for PHI Flexibility of multiple channels for multi-factor authentication Change Management 21
22 Identity Management Solutions SECURE - allows full compliance with NIST Level 3 SCALABLE - deployable to tens of millions of users TRUSTED - uniquely identifies users and helps prevent fraud FLEXIBLE - progressive authentication adapts to risk level COMPREHENSIVE - solves complex identity lifecycle challenges RISK BASED - tailored to enterprise use case and business needs EASY TO DEPLOY - installs inside your firewall or in the cloud 22
23 CONTACT FACMI, FHL7 Chief Medical Officer Anakam Identity Services Equifax 23
VASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
Digital Identity in Healthcare: What's Coming Down the Pike. Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS
Digital Identity in Healthcare: What's Coming Down the Pike Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS Discussion What is the Problem? What is Digital Identity and How Does
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS)
A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) The Federal Drug Enforcement Administration (DEA) regulates prescriptions of controlled substances that have risks for abuse.
DEA's New Proposed Regulations For E-Prescribing
Portfolio Media, Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 [email protected] DEA's New Proposed Regulations For E-Prescribing
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals
HIPAA for HIT and EHRs Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals Donald Bechtel, CHP Siemens Health Services Patient Privacy Officer Fair Information Practices
E-Prescribing of Controlled Substances (EPCS) New York State Board for Podiatry
E-Prescribing of Controlled Substances (EPCS) As of March 27, 2015 it will be mandatory for practitioners, excluding veterinarians, to issue electronic prescriptions for controlled and non-controlled substances.
BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors
BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors INTRODUCTION The implementation of electronic prescribing, or e-prescribing, is one of the most the groundbreaking changes in healthcare.
Appendix B: Existing Guidance to Support HIE Implementation Opportunities
Appendix B: Existing Guidance to Support HIE Implementation Opportunities APPENDIX B: EXISTING GUIDANCE TO SUPPORT HIE IMPLEMENTATION OPPORTUNITIES There is an important opportunity for the states and
Best Practices and Lessons Learned about EHR Adoption. Anthony Rodgers Deputy Administrator, Center for Strategic Planning
Best Practices and Lessons Learned about EHR Adoption Anthony Rodgers Deputy Administrator, Center for Strategic Planning Presentation Topics Value proposition for EHR adoption Medicaid Strategic Health
NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs)
NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg NISTIR 7497 Security Architecture Design Process for Health
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer
HIPAA and Big Data Twenty Third National HIPAA Summit March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer Overview HIPAA and Big Data Big Data Definitions Big Data and Health Care Benefits
NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013
NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy
E-Signature. The Pharmacy Perspective
E-Signature The Pharmacy Perspective Prescriptions arrive at a pharmacy today... Written by a prescriber ( not always on a prescription pad). Do not always know the prescriber s s handwriting legibility
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
Understanding the Security & Privacy Rules associated with the HITECH and HIPAA Acts
Understanding the Security & Privacy Rules associated with the HITECH and HIPAA Acts July 2011 The Health Information Technology for Economic and Clinical Health (HITECH) Act requires covered entities
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
The basics of Health Information Technology
The basics of Health Information Technology 2012 1 What is Health Information Technology? Health IT, or e-health, is increasingly viewed as the most promising tool for improving the overall quality, safety
California State Board of Pharmacy and Medical Board of California
California State Board of Pharmacy and Medical Board of California Transmission and Receipt of Electronic Controlled Substance Prescriptions Pursuant to DEA Interim Final Rule (IFR): Electronic Prescriptions
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
PROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses
Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses DR. KIBBE S RESPONSES What is health information exchange? How can health information exchange help my practice? Can I comply
WHITE PAPER. Data Protection for the Healthcare Industry
WHITE PAPER Data Protection for the Healthcare Industry Data Protection for the Healthcare Industry WHITE PAPER Executive Summary The nature of the healthcare industry has changed dramatically over the
Joe Dylewski President, ATMP Solutions
Joe Dylewski President, ATMP Solutions Joe Dylewski President, ATMP Solutions Assistant Professor, Madonna University 20 Years, Technology and Application Implementation Experience Served as Michigan Healthcare
SAML for EPCS (Electronic Prescription of Controlled Substances)
SAML for EPCS (Electronic Prescription of Controlled Substances) Discussion Slides for review in the OASIS Security Services (SAML) TC August, 2014 DEA Regulation Compliance with New York s istop law-
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
T h e M A RY L A ND HEALTH CARE COMMISSION
T h e MARYLAND HEALTH CARE COMMISSION Discussion Topics Overview Learning Objectives Electronic Health Records Health Information Exchange Telehealth 2 Overview - Maryland Health Care Commission Advancing
How To Prepare For A Patient Care System
Preparing for Online Communication with Your Patients A Guide for Providers This easy-to-use, time-saving guide is designed to help medical practices and community clinics prepare for communicating with
Meaningful Use in a Nutshell
Meaningful Use in a Nutshell Compiled by Phyllis A. Patrick, MBA, FACHE, CHC January, 2011 Phyllis A. Patrick & Associates LLC [email protected] MEANINGFUL USE Defining Meaningful Use Benefits
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Agenda. Government s Role in Promoting EMR Technology. EMR Trends in Health Care. What We Hear as Reasons to Not Implement and EMR
Agenda A 360-Degree Approach to EMR Implementation Environmental Overview Information on the HITECH Stimulus Opportunities Hospitals, Physicians and Interoperability Preparing for an EMR Implementation
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
Statewide Health Information Network of New York. Darryl Hollar Director, Product Management
Statewide Health Information Network of New York Darryl Hollar Director, Product Management 40 New York ehealth Collaborative Overview NYeC is a not-for-profit organization, working to improve healthcare
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
HL7 & Meaningful Use. Charles Jaffe, MD, PhD CEO Health Level Seven International. HIMSS 11 Orlando February 23, 2011
HL7 & Meaningful Use Charles Jaffe, MD, PhD CEO Health Level Seven International HIMSS 11 Orlando February 23, 2011 Overview Overview of Meaningful Use HIT Standards and Meaningful Use Overview HL7 Standards
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Achieving meaningful use of healthcare information technology
IBM Software Information Management Achieving meaningful use of healthcare information technology A patient registry is key to adoption of EHR 2 Achieving meaningful use of healthcare information technology
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment
Securing your Corporate Infrastructure What is really needed to keep your assets protected
Securing your Corporate Infrastructure What is really needed to keep your assets protected Joseph Burkard CISA, CISSP October 3, 2002 1 Securing your Corporate Infrastructure Management Dilemma or Technical
The Impact of NSTIC on the Internal Revenue Service. Economic Case Study: Planning Report 13-2
Planning Report 13-2 Economic Case Study: The Impact of NSTIC on the Internal Revenue Service Prepared by: RTI International for National Institute of Standards & Technology July 2013 Contents Chapter
Healthcare Information Security Today
Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare
Electronic Signature, Attestation, and Authorship
Electronic Signature, Attestation, and Authorship Appendix C: Electronic Signature Model Policy This template document is not intended for adoption as a substitute for a customized organizational policy
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Emerging Trends in Health Information Technology: Personal Health Record(PHR) uphr. Nazir Ahmed Vaid ehealth Services (Pvt) Ltd.
Emerging Trends in Health Information Technology: Personal Health Record(PHR) uphr Nazir Ahmed Vaid ehealth Services (Pvt) Ltd. April 26 2012 PROJECT GOALS Design universal health data accessibility on
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Telemedicine Reimbursement and Compliance Issues. Agenda. Telemedicine Overview Regulatory Structures. Reimbursement Operational and compliance issues
Telemedicine Reimbursement and Compliance Issues Julian Rivera 512.479.9753 [email protected] Alison Hollender 214.999.6193 [email protected] Agenda Telemedicine Overview
Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use
Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing
