Identity: The Key to the Future of Healthcare



Similar documents
VASCO: Compliant Digital Identity Protection for Healthcare

Digital Identity in Healthcare: What's Coming Down the Pike. Lisa Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions, HIMSS

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS)

DEA's New Proposed Regulations For E-Prescribing

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals

E-Prescribing of Controlled Substances (EPCS) New York State Board for Podiatry

Use Case Summary NAME OF UC: SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND PATIENTS. Sponsor(s): Michigan Department of Health and Human Services

Online Identity Attribute Exchange Initiatives

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

How Real-Time Data Integration is Changing the Face of Healthcare IT

Health Care - Meaningful Use of HITECH

BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors

SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND CONSUMERS

Fourth Annual Florida 2010 Electronic Prescribing Report

Appendix B: Existing Guidance to Support HIE Implementation Opportunities

Best Practices and Lessons Learned about EHR Adoption. Anthony Rodgers Deputy Administrator, Center for Strategic Planning

NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs)

April 2, Re: Comments on Connected Health and Care for the Nation. Dear Dr. DeSalvo:

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013

Online Identity Attribute Exchange Initiatives

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Cyber-Security White Paper Final 1Q2013 Version. to HIT Commission Feb. 21, 2013

HIPAA and Big Data Twenty Third National HIPAA Summit. March 17, 2015 Mitchell W. Granberg, Optum Chief Privacy Officer

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

Deborah L. Lafky, Ph.D, CISSP Office of the National Coordinator for Health IT, Office of the Secretary, HHS

AT&T Healthcare Community Online - Enabling Greater Access with Stronger Security

Access Control patient centric selective sharing Emergency Access Information Exchange

Electronic Prescribing of Controlled Substances: The Physician s Perspective

Department of Justice Drug Enforcement Administration Attention: DEA Federal Register Representative/ODL 8701 Morrissette Drive Springfield, VA 22152

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

What s it all about? SAFE-BioPharma Association

E-Signature. The Pharmacy Perspective

Can We Reconstruct How Identity is Managed on the Internet?

Risk and Opportunities in EMR Technology

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Understanding the Security & Privacy Rules associated with the HITECH and HIPAA Acts

CHAPTER 1 INTRODUCTION

Managing the Privacy and Security of Patient Portals

The basics of Health Information Technology

Securing Electronic Health Records (EHRs) to Achieve Meaningful Use Compliance, Prevent Data Theft and Fraud

California State Board of Pharmacy and Medical Board of California

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

PROTECT YOUR WORLD. Identity Management Solutions and Services

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses

WHITE PAPER. Data Protection for the Healthcare Industry

RE: RIN 0991 AB58. Dear Dr. Blumenthal:

Joe Dylewski President, ATMP Solutions

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

SAML for EPCS (Electronic Prescription of Controlled Substances)

2015 Annual Convention

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015

T h e M A RY L A ND HEALTH CARE COMMISSION

How TraitWare TM Can Secure and Simplify the Healthcare Industry

How To Prepare For A Patient Care System

Meaningful Use in a Nutshell

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Consumer Engagement with Health Information Technology Summary of NeHC Survey Results

Big Data, Big Risk, Big Rewards. Hussein Syed

Agenda. Government s Role in Promoting EMR Technology. EMR Trends in Health Care. What We Hear as Reasons to Not Implement and EMR

Second Annual Florida 2008 Electronic Prescribing Report

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

Statewide Health Information Network of New York. Darryl Hollar Director, Product Management

CA Technologies Healthcare security solutions:

An Introduction to Global Patient Identifiers, Inc. December, 2014

Health Information Technology The Texas Landscape Presentation to TASSCC Nora Belcher Texas e-health Alliance August 3, 2010

Weber Human Services Identity Theft Prevention Policy

HL7 & Meaningful Use. Charles Jaffe, MD, PhD CEO Health Level Seven International. HIMSS 11 Orlando February 23, 2011

Copyright Telerad Tech RADSpa. HIPAA Compliance

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

Trusted Identities for Electronic Health Records A National Strategy

Maintaining the Privacy of Health Information in Michigan s Electronic Health Information Exchange Network. Draft Privacy Whitepaper

Secure communications via IdentaDefense

Florida Electronic Prescribing Annual Report for 2012

Four Goals of Certification

Achieving meaningful use of healthcare information technology

HITRUST CSF Assurance Program

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Smart Card Technology in U.S. Healthcare: Frequently Asked Questions

The Impact of NSTIC on the Internal Revenue Service. Economic Case Study: Planning Report 13-2

Healthcare Information Security Today

Electronic Signature, Attestation, and Authorship

State of New Hampshire. Phase 3 Converging on Solutions discussion deck Business and Technical Operations Workgroup. July 20, 2010

FLORIDA CENTER FOR HEALTH INFORMATION AND POLICY ANALYSIS AGENCY FOR HEALTH CARE ADMINISTRATION

Glossary of Key Terms

Emerging Trends in Health Information Technology: Personal Health Record(PHR) uphr. Nazir Ahmed Vaid ehealth Services (Pvt) Ltd.

Information Security Basic Concepts

Telemedicine Reimbursement and Compliance Issues. Agenda. Telemedicine Overview Regulatory Structures. Reimbursement Operational and compliance issues

Impact of Meaningful Use and Healthcare Transformation On Patient Access

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Connecting and Protecting the Last

Identity Access Management: Beyond Convenience

Transcription:

Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011

Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital deaths due to medical errors every year. Avoids healthcare waste. Up to $300B per year on treatments with no health yield. We spend 2X per capita as any other industrialized nation. We rank last in population health status. Accelerates health knowledge diffusion. Average of 17 years for medical evidence to be integrated into practice. Reduces variability in delivery and access. Access to specialty care is highly dependent on geography. 2

Why is Health Information Technology Critical? Promotes public health and preparedness. Surveillance is fragmented, and untimely. Empowers consumer involvement in health management. Patients currently minimally involved in own health decisions. Strengthens health data privacy and protection. Public fear of identity theft and loss of privacy. Healthcare Reform cannot do this without HIT. Paper records cannot solve these problems! 3

Evolution of Healthcare Paradigm Patient Clinicians Paper Records Exam Room 4

Evolution of Healthcare Paradigm Clinicians Patient Electronic Health Record System Public Health Secure HIE Network External Data Sources Lab Lab Lab Pharmacy Pharmacy Pharmacy Exam Clinical Room Decision Support System Best Practice Rules AHRQ Quality Reports to Clinicians, Payers, And Public Complete the Feedback Loop 5

Evolution of Healthcare Paradigm Clinicians Patient Electronic Health Record System Public Health Secure HIE Network External Data Sources Lab Lab Lab Pharmacy Pharmacy Pharmacy Clinical Decision Support System Best Practice Rules AHRQ Quality Reports to Clinicians, Payers, And Public Complete the Feedback Loop 6

Future for Healthcare Goal: High quality, cost-effective healthcare. Means: Clinician/Patient direct interaction with Clinical Drivers: HIE + EHR + CDSS => SAVES LIVES and $$$ Interoperable HIE is KEY to Meaningful Use of HIT which, in turn, is KEY to health reform! Requires: EHR (with CDSS and HIE) and: Interoperability with sources of clinical data and sources of computable rules for best clinical practices (Standards). Incentives to incorporate into healthcare practice (Resources). Investigations of systemic failures to enable systems that detect and prevent errors through best practices at the point of decision making. Trust through agreement on standards for interoperable security and privacy (including patient consent). 7

Trust Patients must trust the HIE system. Lack of trust = no permission to disclose health records. Providers must trust the HIE system. Lack of trust = no information exchange. Loss of perceived control of PHI in HIE. Trusted provider no longer in charge of data. Access to large amounts of PHI accumulated by HIE. Increased potential for breach which could stop HIE. HIE will fail without access to PHI. Health reform will fail without HIE! Trust depends on believable security mechanisms and a 8

Security Requires Assurance of Identity High level of assurance that the person who is sending information is who say they are. Message non-repudiation through electronic signatures. High level of assurance that the person who is receiving information is who we think they are. Including mechanisms to prevent information from being changed or viewed by anyone else through encryption. High level of assurance that the patient identified in the information is who we think they are. Patient identification accuracy. These mechanisms are dependent on high assurance identity proofing and multi-factor authentication. NIST Level 3 assurance now available commercially at reasonable prices. 9

Assurance of Patient Identity No national standard for how to uniquely identify patients. HIPAA requirement for standard patient ID was not implemented. Merging records from multiple locations is required. Matching probability is much less than100% -- worse without SSN! Identity proofing of patients is required for security. In-person identity proofing is impractical -- Electronic access to medical records must be secured. Internet access to patient portal is needed to meet consumer Fraud prevention in public programs (e.g., Medicare and Medicaid) requires patient identity to be assured. Electronic recording of consent directives. Must be assured that it is truly the patient who is setting the limits. 10

Assurance of Provider Identity Remote access to patient information (HIPAA). Access from home, wireless devices, and patient homes. Access to government held PII. OMB,FISMA, and NIST requirements. Submission of quality information. Pay for performance programs. Meaningful Use incentive programs (CMS). Fraud prevention and enforcement. CMS (Medicare and Medicaid requirements). Electronic prescribing of controlled substances. DEA requirements are very strict. 11

DEA IFR for Controlled erx Only a DEA registrant may sign the prescription. DEA regulation effective June 1, 2010. To sign, the registrant must complete a two-factor authentication protocol that meets the requirements of NIST Assurance Level 3 and uses two of the following three factors: (1) Something only the practitioner knows, such as a password or response to a challenge question. (2) Something the practitioner is, biometric data such as a fingerprint or iris scan. (3) Something the practitioner has, a device separate from the computer to which the practitioner is gaining access. To obtain an authentication credential the registrant must pass identity proofing that meets the requirements of NIST Assurance Level 3. 12

The Problem: Identities are difficult to verify over the internet. Privacy remains a challenge. Numerous government services must be conducted in person or by mail, leading to continual rising costs for state, local and federal governments. Electronic health records forward without solving authentication challenge for providers and individuals. New Yorker, July 5, 1993

Usernames and Passwords are Broken Most people have 25 different passwords, or use the same one over and over. Rising costs of identity theft. 123% increase in financial institution Suspicious Activity Reports in last 6 years 11.7 million est. victims over 2 years $17.3 billion est. cost to economy over 2 years Cybercrime is also on the rise Incidents up 22% from 2009 to 2008 Total loss from these incidents up 111%, to $560 million.

This is NOT the solution!

National Strategy for Trusted Identities in Cyberspace April 2011 NSTIC Guiding Principles Privacy-Enhancing and Voluntary Secure and Resilient Interoperable Cost-Effective and Easy To Use NSTIC calls for an Identity Ecosystem, and organizations will be able to trust each other because they follow agreed upon standards to obtain

NSTIC calls for: Private sector will lead the effort Not a government-run identity program Industry is in the best position to drive technologies and solutions Can identify what barriers need to be overcome Federal government will provide support Help develop a private-sector led governance model Facilitate and lead development of interoperable standards Provide clarity on national policy and legal framework around liability and privacy Act as an early adopter to stimulate demand

Next Steps for NSTIC Convene Private Sector Workshops on governance, privacy and technology FY11 Focus Establish Governance model Private sector led; multi-stakeholder collaboration Enable expedited focus on consensus standards and operating rules Explore models for addressing liability Design Pilots: Develop criteria for selection Assess potential programs Prepare for formal pilot launches with funding in FY12 Government as an early adopter to stimulate demand Ensure government-wide alignment with the Federal Identity, Credential, and Access Management (FICAM) Roadmap Increased adoption of Trust Framework Providers (TFP)

NIST IR 7497 -- TABLE OF CONTENTS Security Architecture Design Process for Health Information Exchanges (HIEs) September 2010 1.0 EXECUTIVE SUMMARY 2.0 INTRODUCTION 3.0 HIE CONTEXTS 4.0 HIE SECURITY ARCHITECTURE DESIGN PROCESS 5.0 CAPSTONE POLICIES 6.0 ENABLING SERVICES 7.0 ENABLING PROCESSES 8.0 NOTIONAL ARCHITECTURE 9.0 TECHNOLOGY SOLUTIONS AND STANDARDS 10.0 BUILDING A NATIONWIDE HIE USING REGIONAL HIES 19

ENABLING SERVICES Risk Assessment Entity Identity Assertion (Authentication) * Credential Management (Licenses, etc.) * Access Control (Authorization) * Privilege Management (Roles, Permissions) * Collect and Communicate Audit Trail Document Integrity (Hash and Electronic Signature) * Secured Communication Channel Document Confidentiality (Encryption) * De-identification Non-Repudiation of Origin (Electronic Signature) * Identity Dependent Services (8 of 12) Manage Consent Directives (Assured Patient Identity) * 20

Full Range of Identity Services Registration Data Collection and/or Integration Identity Proofing Record Matching / Identity Cleanup Entity Proofing + association with responsible individual(s) Individual Proofing = carbon-based life form, species homo sapiens Electronic Identity Tokens and Processes Electronic Signature, PKI Keys, Authentication Tokens Hashing, Encrypting, Signing, and Authenticating Documents Attribute Associations Credentials (Licenses, privileges, etc.) Identity Authentication multiple levels and methods available High Level of Assurance (NIST Level 3) Required for PHI Flexibility of multiple channels for multi-factor authentication Change Management 21

Identity Management Solutions SECURE - allows full compliance with NIST Level 3 SCALABLE - deployable to tens of millions of users TRUSTED - uniquely identifies users and helps prevent fraud FLEXIBLE - progressive authentication adapts to risk level COMPREHENSIVE - solves complex identity lifecycle challenges RISK BASED - tailored to enterprise use case and business needs EASY TO DEPLOY - installs inside your firewall or in the cloud 22

CONTACT FACMI, FHL7 Chief Medical Officer Anakam Identity Services Equifax Bill.Braithwaite@Equifax.com 23