Use Cases for Argonaut Project. Version 1.1

Similar documents
Administering Jive Mobile Apps

CASE STUDY. Enhancing the Patient Experience Harris Mobile Patient Engagement Platform

Adobe Digital Publishing Security FAQ

Security Considerations

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses

PrinterOn Print Management Overview

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

The increasing popularity of mobile devices is rapidly changing how and where we

My Stuff Everywhere Your Content On Any Screen

Summer 2013 Cloud Initiative. Release Bulletin

Building Secure Applications. James Tedrick

MaaS360 Mobile Enterprise Gateway

Version 3.2 Release Note. V3.2 Release Note

Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange

MaaS360 Mobile Enterprise Gateway

CA Service Desk Manager - Mobile Enabler 2.0

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

HIPAA Compliance Guide

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

ios Education Deployment Overview

Image Enabled EMR / EHR

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

OAuth 2.0 Developers Guide. Ping Identity, Inc th Street, Suite 100, Denver, CO

HIPAA Compliance Guide

Workday Mobile Security FAQ

VASCO: Compliant Digital Identity Protection for Healthcare

PrinterOn Mobile Applications for ios and Android

Ensuring the security of your mobile business intelligence

Type of Personal Data We Collect and How We Use It

TrustedX - PKI Authentication. Whitepaper

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, Integration Guide IBM

Egnyte Cloud File Server. White Paper

Middleware- Driven Mobile Applications

OneLogin Integration User Guide

FollowMyHealth Universal Health Record Patient Access v2.2.1 User Guide

SQL in the Cloud: Is it Game Changing? V P P r o f e s s i o n a l S e r v i c e s

Developing Microsoft SharePoint Server 2013 Core Solutions

SYSPRO App Store: Registration Guide

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015

KHIN Patient Portal RFP Questions and Responses

Advanced Configuration Steps

1 Overview Configuration on MACH Web Portal 1

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Managing Privacy and Security Challenges of Patient EHR Portals

nexus Hybrid Access Gateway

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Threat Modeling Cloud Applications

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

Getting Started Guide for Developing tibbr Apps

McAfee Cloud Single Sign On

Remote Access End User Reference Guide for SHC Portal Access

Technical. Overview. ~ a ~ irods version 4.x

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Learn More Cloud Extender Requirements Cheat Sheet

PrinterOn Mobile App for ios and Android

December P Xerox App Studio 3.0 Information Assurance Disclosure

Universal Health Record Patient Access v2.2.4 User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide

Installation Guide. Qlik Sense 1.1 Copyright QlikTech International AB. All rights reserved.

Self Service Portal and 2FA User Guide

An Overview of Samsung KNOX Active Directory and Group Policy Features

HotSpot Enterprise Mobile Printing Solution. Security Whitepaper

HIPAA COMPLIANCE AND

... Introduction Acknowledgments... 19

Solution Requirements and Process Flow

zevent Mobile Application

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Virtual Cabinet Document Portal User Guide

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA

Manual for Android 1.5

Healthcare Compliance Solutions

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Authorized. User Agreement

Setting the World on FHIR

Dave Haseman, Ross. Hightower. Mobile Development for SAP* ^>. Galileo Press. Bonn. Boston

Creating unique customer experiences

MaaS360 Cloud Extender

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

Transcription:

Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015

Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification and constraints. Simplified UML diagram.

Page 3 Introduction The Argonaut Project seeks to rapidly develop a first- generation FHIR- based API and Core Data Services specification, along with a Security Implementation Guide, that together will facilitate expanded sharing of electronic health information. Our goal is to enable interested vendors and providers to develop and implement a focused but complete FHIR API specification, and accompanying security implementation, beginning in the spring of 2015. We recognize that the these specifications will introduce a new architectural pattern and style for accessing data and services, as well as new, more flexible and open, methods for authorizing access to health information. Therefore, we are proposing use cases that are simple, yet functional, and that address both real security risks and trust risks associated with potential discomfort with these new ways of doing things, as both of these can impede vendor and provider adoption. We propose the following four functional use cases, as described below: 1. Patient uses provider- approved web application to access health data 2. Patient uses provider- approved mobile app to access health data 3. Clinician uses provider- approved web application to access health data 4. Clinician uses provider- approved mobile app to access health data In addition, we have defined as a near future use case: 5. Clinician in organization A uses EHR A to access patient data in EHR B, operated by organization B Definitions EHR System: We use EHR in a broad context inclusive of any system that holds and controls individually identifiable health information. Each EHR system has the capability to mediate app requests for access and to authorize access to FHIR resources. Provider Organization: We use the term provider organization to refer to any organization that holds individually identifiable health information. Provider Approved: By the term provider- approved we mean that the primary data holder has developed, selected, or otherwise approved a named application as acceptable for enabling a user to access protected resources. The means by which that approval is accomplished are outside the scope of these use cases. Mobile Application: By the term mobile application we include all applications that are hosted in environments that are incapable of providing assured protection of secrets. This includes applications that are downloaded and installed on mobile devices (e.g., ios, Android) as well as rich web applications implemented within browsers. Mobile applications essentially are applications hosted in any environment that lacks hardware segmentation of memory for isolating and protecting critical and sensitive code.

Page 4 Web Application: By the term web application we mean an application that is hosted on a trusted web server and that is accessed through a user s web browser. A web application may be launched from a portal or EHR, or may be accessed directly through its URL. A web application is capable of protecting a secret assigned to it to for use in authenticating its own identity. Use Case 1: Patient uses a provider- approved web application to access health data Introduction In this use case, the provider organization offers patients a web- based application that enables the patient to query for, retrieve, view, use, and locally persist discrete clinical data elements or clinical summary documents. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application might enable a patient to view a single lab result, or to request and retrieve a Clinical Summary document, or to identify relevant clinical trials from a national database. The data request may be a selectable function within the application (e.g., show me my visit summary), or the application may need to request data as input to a user- selectable function (e.g., chart my blood glucose levels over the past 3 months). Once the requested data or documents are retrieved, the application can work with them (e.g. by displaying to the patient, or using as the input to another function, or persisting for future use). Actors Provider organization that holds EHR data, provides a patient portal account, and approves web- based applications capable of accessing those data Patient uses her browser to run the application that accesses her healthcare records to perform some useful task (e.g. visualization, interpretation, communication) Application requests, and (on approval) accesses EHR data on the patient's behalf Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside scope of this use case) The provider has developed, selected, or otherwise approved a web- based software application that uses structured EHR data to help patients perform some valuable function (e.g. data visualization, interpretation, or communication). The provider has registered the application with the authorization server and has issued to the application credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules.

Page 5 The application functions in accordance with the provider organization s privacy and security policy (e.g., runs on a trusted server, enables data persistence only in accordance with policy). The provider has identity- proofed the patient and has issued credentials (e.g., userid, password) for use in authenticating that identity. Provider holds the patient s health data. Post- conditions The patient has run the application on her own EHR record, or else the patient has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Patient opens web browser and launches the application. (The workflow from which the application is launched is outside the scope of this use case.) 2. Patient selects an application option that requires that data be retrieved from the patient s EHR. 3. Application requests access to the desired data. 4. Authorization server authenticates the application s identity. 5. Authorization server authenticates the patient s identity. 6. Authorization server authorizes the application to retrieve the requested data within a limited period of time. 7. Application queries Resource Server for data elements 8. Resource Server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 9. Application works with the retrieved data as requested by the patient, potentially persisting it for future use. 10. This use case ends when the patient logs out of the application, or the application server otherwise terminates the patient s session. Alternative Flow This flow is identical to the Basic Flow except that the application sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements.

Page 6 UML Diagram for Use Case 1 Use Case 2: Patient uses provider- approved mobile app to access health data Introduction In this use case, the provider organization offers patients a mobile app that enables the patient to query for, retrieve, view, use, and persist discrete clinical data elements or clinical summary documents. The use case provides the app programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, the app might help a patient view the result of a recent lab test, or to request and retrieve a Clinical Summary document, or to identify relevant clinical trials from a national database. The data request may itself be a selectable function within the app (e.g., show me my lab result from last week), or the app may request data as input to a user- selectable function (e.g.,

Page 7 chart my blood glucose levels over the past 3 months). Once the requested data are retrieved, the patient is able to view the data or document, use the data as input to another function, or persist the data for future use, such as charting and presenting longitudinal data. Depending upon the app s architecture, as approved by the provider organization, the data may be persisted only on the mobile device or within the app s cloud- based server. Actors Provider organization that holds the EHR data and offers patients a mobile app for accessing those data Patient downloads and installs the mobile app and uses it to access her data and perform some useful functions (e.g. visualization, interpretation communication) Mobile app requests, and (on approval) accesses EHR data on the patient's behalf. App server (optional) cloud- based server the app uses to persist data Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside scope of this use case) The provider has developed or selected a mobile app that uses structured EHR data to help patients perform some valuable function (e.g. data visualization, interpretation, or communication). The approved app may or may not be associated with a cloud- based server, but if the app enables storing data in a cloud environment, the cloud server is included in the approved software. The provider has registered the app with the authorization server. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The app operates in accordance with the provider s privacy and security policy (e.g., enables data persistence only in accordance with policy). The provider has identity- proofed the patient and has issued credentials (e.g., userid, password) for use in authenticating that identity. Provider holds the patient s health data. Post- conditions The patient has run the app to access her own record, or else the patient has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Patient opens the app. (The workflow from which the application is launched is outside the scope of this use case.) 2. Patient selects an app option that requires that data be retrieved from the patient s record held by the EHR system s resource server. 3. App requests access to the desired data.

Page 8 4. Authorization server authenticates the patient s identity. 5. Authorization server asks patient to authorize the app to access the data. 6. Patient authorizes the app. 7. Authorization server authorizes the app to retrieve the requested data within a limited period of time. 8. App queries resource server for discrete data elements. 9. Resource server returns requested and authorized data elements, or indicates that the requested data are unavailable. 10. App uses the retrieved data as needed, potentially persisting it for future use to the mobile device or to a cloud- based server. 11. App may persist data for future use. 12. This use case ends when the patient no longer is using the app, or when the mobile device is shut down. Alternative Flow This flow is identical to the Basic Flow except that the app sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements. UML Diagram for Use Case 2

Page 9 Use Case 3: Clinician uses provider- approved web application to access health data Introduction In this use case, the provider organization offers its clinicians a web- based application that enables the clinician to query for, retrieve, view, use, and locally persist discrete data elements and clinical summary documents. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application might enable a clinician to view a single lab result for a named patient, or to request and retrieve a Transition of Care or Clinical Summary document for a named patient. The data request may be a selectable function within the application (e.g., show me John Doe s Clinical Summary), or the application may need to request data as input to a user- selectable function (e.g., chart glucose blood levels for John Doe over the past 3 months). Once the requested data or documents are retrieved, the application can work with them (e.g., by displaying to the clinician, or using as the input to another function, or persisting for future use). Actors Provider organization that holds the EHR data, provides an EHR account, and approves web- based applications capable of accessing patients data Clinician uses her browser to run the application that accesses patient data to perform some useful task (e.g., visualization, interpretation, communication) Application requests, and (on approval) accesses EHR data on the clinician s behalf Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside the scope of this use case) The provider has developed, selected, or otherwise approved a web- based software application that uses structured EHR data to help clinicians perform some valuable function (e.g. data visualization, interpretation, or communication). The provider has registered the application with the authorization server and has issued to the application credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The application functions in accordance with the provider organization s privacy and security policy (e.g., runs on a trusted server, enables data persistence only in accordance with policy). The provider has identity- proofed the clinician and has issued credentials (e.g., userid, password) for use in authenticating that identity and clinician role. Provider holds the named patient s EHR data.

Page 10 Post- conditions The clinician has run the application and accessed patient data, or else the clinician has been given a reason why the request has not been fulfilled. The provider systems have recorded the access (audit is outside the scope of this use case). Basic Flow 1. Clinician opens web browser and launches the application. (The workflow from which the appl is launched is outside the scope of this use case.) 2. Clinician selects an application option that requires that data be retrieved from a named patient s EHR. 3. Application requests access to the desired data. 4. Authorization server authenticates the application s identity. 5. Authorization server authenticates the clinician s identity and role. 6. Authorization server authorizes the application to retrieve the requested data within a limited period of time. 7. Application queries EHR system for data elements 8. Resource server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 9. Application works with retrieved data in web browser. 10. Application may persist data for future use. 11. This use case ends when the clinician logs out of the application, or the application server otherwise terminates the clinician s session. Alternative Flow This flow is identical to the Basic Flow except that the application sends a request for a Transition of Care or Clinical Summary document instead of querying for and retrieving discrete data elements.

Page 11 UML Diagram for Use Case 3 Use Case 4: Clinician uses provider- approved mobile app to access health data Introduction In this use case, the provider organization offers clinicians a mobile app that enables the clinician to query for, retrieve, view, use, and persist discrete data elements or a document containing a summary of a named patient s EHR data. The use case provides the app programmatic access to all of the discrete data elements included in the Common MU Data set. For example, the app might help a clinician view the result of a patient s recent lab test, or to request and retrieve a Clinical Summary or Transition of Care document. The data request may itself be a selectable function within the application (e.g., show me John Doe s Clinical Summary), or the application may need to request data as input to a user- selectable function (e.g., chart glucose blood levels for John Doe over the past 3 months). Once the requested data are retrieved, the clinician is able to view the data or document, use the

Page 12 data as input to another function, or persist the data for future use, such as charting and presenting longitudinal data. Depending upon the app s architecture, as approved by the provider organization, the data may be persisted only on the mobile device or within the app s cloud- based server. Actors Provider organization that holds the EHR data and offers clinicians a mobile app for accessing patients EHR data Clinician uses a mobile app to select options for retrieving, viewing, manipulating, and saving data Mobile app queries for and retrieves data, as requested and authorized App server cloud- based server the app uses to persist data Authorization server server used by EHR system to authenticate the clinician and to authorize the application to access EHR data on behalf of the clinician, in accordance with legal and institutional policies Resource server server used by EHR system to hold and retrieve EHR data as authorized Pre- conditions (outside the scope of this use case) The provider has developed or selected a mobile app that enables clinicians to query for, retrieve, view, and persist data elements and summary documents for named patients. The approved app may or may not be associated with a cloud- based server, but if the app enables storing data in a cloud environment, the cloud server is included in the approved software. The provider has registered the app with the authorization server and has issued to the app credentials to enable it to authenticate its own identity. Provider organization operates in compliance with HIPAA Privacy and Security Rules. The app operates in accordance with the provider s privacy and security policy (e.g., enables data persistence only in accordance with policy). The provider has identity- proofed the clinician and has issued credentials (e.g., userid, password) for use in authenticating that identity and clinician role. Provider holds the named patient s EHR data. Post- conditions The clinician has found, viewed, and possibly downloaded the requested data; else the clinician has been given a reason why the request has not been fulfilled. The provider system has recorded the access (audit is outside the scope of this use case). Basic Flow 1. Clinician opens the app. (The workflow from which the app is launched is outside the scope of this use case.) 2. Clinician selects an app option that requires that data be retrieved from a named patient s EHR. 3. App requests access to the desired data.

Page 13 4. Authorization server authenticates the clinician s identity and role. 5. Authorization server asks clinician to authorize the app to access the data. 6. Clinician authorizes the app. 7. Authorization server authorizes the app to retrieve the requested data within a limited period of time. 8. App queries resource server for discrete data elements 9. Resource server returns the requested and authorized data elements, or indicates that the requested data are unavailable. 10. App works with retrieved data. 11. App may persist data for future use. 12. This use case ends when the clinician no longer is using the app, or when the mobile device is shut down. Alternative Flow This flow is identical to the Basic Flow except that the app sends a request for a Transition of Care or Clinical Summary document instead of querying for and retrieving discrete data elements. UML Diagram for Use Case 4

Page 14 Use Case 5 (future: Provider using EHR A access patient record held in EHR B Introduction In this use case, the clinician uses an EHR application (EHR A) that allows the clinician to query for, retrieve, view, use, and locally persist discrete clinical data elements or clinical summary documents held in EHR B for treatment purposes. The use case provides the application programmatic access to all of the discrete data elements included in the Common MU Data Set. For example, an application in EHR A might enable the clinician to view a single lab result, or to request and retrieve a Clinical Summary document, or to graph blood pressure results over time using data from EHR B. Once the requested data or documents are retrieved, EHR A can work with them (e.g. by displaying to the clinician, or using as the input to another function, or persisting for future use). Actors Clinician authorized clinical user of EHR A Provider A - the organization with which clinician is associated EHR A clinical system that Provider A has implemented to enable users to access and use resources held by Provider A and its trusted partners Provider B - the organization that has authority over EHR B EHR B clinical system that Provider B has implemented to enable users to access and use resources held by Provider B and its trusted partners Pre- conditions (outside scope of this use case) The Clinician has authenticated herself to EHR A, which is capable of fulfilling the functions described in this document. EHR A is capable of protecting secrets, including a credential used to authenticate its own identity and tokens used to access resources. EHR B is capable of fulfilling the functions described in this document Provider B has agreed to trust Provider A s EHR system and clinicians to access Provider B s clinical records for certain treatment purposes.. Both Provider A and Provider B hold trustworthy proof of organizational identity. Provider B trusts Provider A to perform essential security and authentication functions (e.g., to authenticate Clinician) and trusts the data use request claims made by Provider A. EHR B holds the patient information required by the Clinician. EHR A and EHR B can link patient identity to the patient whose data are being requested. Providers A and B operate in compliance with HIPAA Privacy and Security Rules. Patient is a competent adult, and patient data contains no sensitive information requiring special protections (e.g., SAMHSA protected Part 2 data, HIV status, etc.)

Page 15 Post- conditions The Clinician using EHR A has accessed the patient record in EHR B, or else the Clinician has been given a reason why the request has not been fulfilled. EHR A and EHR B have recorded the access (audit and accounting of disclosures are outside the scope of this use case). Basic Flow 1. Clinician uses EHR A. (The workflow from which the EHR A is launched is outside the scope of this use case.) 2. Clinician selects an EHR option that requires that data be retrieved from EHR B for HIPAA- defined treatment purposes. 3. EHR A assures that the Clinician s request is consistent with Provider A s institutional policies and trust agreement with Provider B. 4. Upon approval, EHR A establishes a secure link with EHR B. 5. EHR A requests access to the desired patient s data in EHR B on behalf of the authenticated Clinician 6. EHR B authorizes EHR A to retrieve the requested data, on behalf of the Clinician, within a limited period of time. 7. EHR A queries EHR B for the required data elements. 8. EHR B returns the resources, as requested and authorized, or indicates that the requested data are unavailable. 9. EHR A works with the retrieved data as requested by the Clinician, potentially persisting the data for future use. 10. This use case ends when the Clinician completes the use of EHR A functions working with the requested patient s data. Alternative Flow This flow is identical to the Basic Flow except that EHR A sends a request for a Clinical Summary document instead of querying for and retrieving discrete data elements.

Page 16 UML Diagram for Use Case 5