Riding the Wave of Digital Health Information

Download Report

Transcript Riding the Wave of Digital Health Information

How not to get lost in the Big Ocean of
Portable Electronic Health Records:
Riding the Wave of Digital Health
Information
Spring Conference
April 4, 2008
Gary Beatty
President
EC Integrity, Inc
Vice-Chair ASC X12




Need to reduce the cost of health care
Increase quality of health care
Consumer driven health care
Online health records




Payer support for community health records
Transparency in health care
Pay for performance programs
Governmental
EMR
HR
EHR
PHR
CCR
PHI
Hybrids
Health Records (AHIMA)
The legal business record for a healthcare organization.
 Individually identifiable information
 Any medium
 Collected, processed, stored, displayed


Health Records contain
Diagnosis
 Medications
 Procedures
 Problems
 Clinical Notes
 Diagnostic Results
 Images
 Graphs
 Other items deemed necessary


Health Records



Support continuity of care
Planning patient care
Provides planning information
 Resource allocation
 Trend analysis
 Forecasting
 Workload management
 Justification for billing information

Electronic Medical Record (EMR) (HIMSS)

An application environment composed of:








Clinical Data Repository (CDR)
Clinical Decision Support (CDS)
Controlled medical terminology
Order entry
Computerized provider order entry
Pharmacy
Clinical document applications
Enterprise support
 Inpatient and Outpatient
 Use to document, monitor and manage delivery of health
care

Electronic Medical Record (EMR) (HIMSS)


The EMR is the legal record
Owned by the Care Delivery Organization (CDO)

Electronic Health Record (EHR) (HIMSS)
Longitutal electronic medical record across encounters in
any care delivery setting.
 Resource for clinicians






Secure
Real-time
Point-of-care
Patient centric information source
Aids collection of data for other uses






Billing
Quality management
Outcomes reporting
Resource planning
Public health disease surveillance
Reporting

Electronic Health Record (EHR) (HIMSS)

Includes:
 Patient demographics
 Progress notes
 Problems
 Medications
 Vital signs
 Past medical history
 Immunizations
 Laboratory data
 Radiology reports

Electronic Health Record (EHR) (HIMSS)



Automates / streamlines clinicians workflow
Complete record of clinical encounter
Supports other care-related activities
 Evidence-based decision support
 Quality management
 Outcome reporting

Personal Health Record (PHR)
Created by the individual
 Summarizes health and medical history
 Gathered from many sources
 Format of PHR

 Paper
 Personal computer
 Internet based
 Portable storage

Continuity of Care Record (CCR)

Patient Health Summary Standard
 ASTM / MMS / HIMSS / AAFP / AAP co-
development



Core health care components
Sent from one provider to another
Includes
 Patient demographics
 Insurance information
 Diagnosis and problem
 Medications
 Allergies
 Care plan

Hybrid Health Record

Both
 Paper health records
 Electronic health records

Protected Health Information (PHI)

Any health care information linked to a person
 Health Status
 Provision of Health Care
 Payment of Health Care

Includes
•Names
•Geographic subdivision smaller than a state
•Dates related to an individual
•Phone Numbers
•Fax Numbers
•Email Addresses
•SSN
•Medical Record Numbers
•Beneficiary Numbers
•Account Numbers
•Certificate/license numbers;
• Vehicle identifiers and serial numbers
• license plate numbers
• Device identifiers and serial numbers
• Web Universal Resource Locators (URLs)
• Internet Protocol (IP) address numbers
• Biometric identifiers
• Finger
• voice prints
• Full face photographic images and any
comparable images
• Any other unique identifying number,
characteristic, or code

Privacy


Authentication


Did it arrive exactly as sent?
Non-repudiation of receipt



How do I know who sent it?
Data Integrity


Can anyone else read it?
Can the receiver deny receipt?
How do I know it got there?
How do I track these activities?

Internet / Intranet


Wired
Wireless
 Wifi (802.11a, b, g, i, n)
 Bluetooth (Personal Area Network - PAN)



VoiP
Dial-up
Mobile Devices

Smart Phones
 Mobile Standards (GSM, GPRS, etc.)



PDA
Tablet PC’s
Physical Media

Magnetic, optical, flash (thumb drives), others

RC4 (ARC4 /ARCFOUR) – Stream Cypher (easily broken)

Secure Sockets Layer (SSL)
 WEP Wire Equivalent Privacy
WPA WiFi Protected Access




WPA2 (based upon 802.11i)
Data Encryption Standards (DES)
Advanced Encryption Standards (AES)

Government strength encryption




Firewall machines
IP address selection
ID + Passwords
Security techniques





Encryption
Digital Signatures
Data Integrity Verification
Non-repudiation
Trading Partner Agreements (TPA)
CYPHERTEXT
PLAINTEXT
DOCUMENT
ENCRYPT
DECRYPT
PROVIDER
PLAINTEXT
DOCUMENT
PAYER
PRIVATE KEY




n * (n-1) / 2 keys to manage
100 users would require 4950 keys
Key size 128 bits
Generally considered fast
Gary
Alice
Julie
Karen
Frank
Erin
Dale
Mary
CYPHERTEXT
PLAINTEXT
DOCUMENT
ENCRYPT
DECRYPT
PROVIDER
PLAINTEXT
DOCUMENT
PAYER
PAYER’S
PUBLIC KEY
PAYER’S
PRIVATE KEY




n key pairs needed for n partners
key size (128, 768, 1024, 2048 bits)
Generally considered slower
What happens if you lose your key?
Gary
Alice
Julie
Public Key Directory
Gary
Alice
Frank
Erin
Frank
Mary
Dale
Karen
Julie
Erin
E
F
G
H
Karen
Dale
Mary


A digitized signature is a scanned image
A digital signature is a numeric value that is
created by performing a cryptographic
transformation of the hash of the data using the
“signer’s” private key.
Ö m25_
+¦_+_ò`_^5w+A___enruƒ•\ƒ½PÑ7
»q*++•¤Gß_¿_°;·Ae¦_7¦?ââá+H¶¥-÷•90Y
å+£ú'¦Æ<§_8óX`p¡ì•É_V+1^ª+
¦%Gary A. Beatty <[email protected]>


Part of the digital signature process
A secure one way hashing algorithm used to
create a hash of the data
PROVIDER A
EHR
Provider B
PUBLIC KEY
Encoded
Provider B
Cypher
PROVIDER A
PRIVATE KEY
Cypher
Encoded
PROVIDER A
PUBLIC KEY
EHR
Provider B
PRIVATE KEY

AS1 – Applicability Statement 1
Email exchange of electronic transactions
 S/MIME – Secure Multi-Purpose Internet Mail Extensions
 Uses SMTP (Simple Mail Transfer Protocol)
 Satisfies Security Requirements






Encryption
Authentication
Integrity
Non-repudiation
What’s needed
 Email capability
 Electronic Transaction
 Digital Certificate

AS2 – Applicability Statement 2



HTTP exchange of electronic transactions
S/MIME – Secure Multi-Purpose Internet Mail Extensions
Uses HTTPS
 Hypertext Transfer Protocol over Secure Socket Layer


Allows for REAL TIME delivery
Satisfies Security Requirements





Encryption
Authentication
Integrity
Non-repudiation
What’s needed
 Web Server (static IP address)
 Electronic Transaction
 Digital Certificate

AS3 – Applicability Statement 3





FTP exchange of electronic transactions
S/MIME – Secure Multi-Purpose Internet Mail Extensions
Uses FTP – File Transfer Protocol
Allows for REAL TIME delivery
Satisfies Security Requirements





Encryption
Authentication
Integrity
Non-repudiation
What’s needed
 FTP Server
 Electronic Transaction
 Digital Certificate

Electronic Credit Card


Issues by Credential Authority








Establishes “Credentials” for electronic transactions
Name
Serial Number
Expiration Dates
Certificate Holder’s Public Key
Digital Certificate of Certification Authority
Verified by Registration Authority
X.509 Standards
Registry of Digital Certificates

Access with HIPAA Identifiers


We can secure transmission of data!
Weakest link – usually when data is
AT REST!
Paper
 On the screen
 Waste baskets


Physical Security
Building access
 Data Center access


Electronic Security
Screen Savers
 Auto Logoff

Spring Conference
April 4, 2008
Gary Beatty
President
EC Integrity, Inc
Vice-Chair ASC X12