SlideShare a Scribd company logo
Health Relationship Trust
(HEART) Working Group
Eve Maler, WG co-chair
eve.maler@forgerock.com | @xmlgrrl
22 June 2017
http://openid.net/wg/heart/
Why?
• Individuals want to gather, control, and share
their health data
– People want to be able to give permission for access
– …and to change their minds
• More and more, this data is sourced digitally
– Such as from mobile apps and smart devices
– This is especially so for complex health conditions
• …and is stored in electronic records
• Clinicians, insurers, and researchers want or need
data access to diagnose, plan care, and pay for
care
• HEART puts the individual back at the center of
the health data-sharing conversation
WG goals and scope
• RESTful health data sharing
• Patient-centric, privacy-sensitive
• Internationally applicable
• Primarily profiling existing specs
– OAuth, OpenID Connect, UMA, HL7’s FHIR API
• Foster interoperable implementations
• Not specifying a patient discovery mechanism
• Not specifying trust frameworks
Who takes part?
• Health/health IT subject matter experts
– E.g., SAMHSA, VA, HL7, doctors…
• Technology experts
– Implementers
– Spec authors and editors
• Leadership team:
– Co-chair Debbie Bucci (HHS ONC)
– Co-chair Eve Maler (ForgeRock)
– Spec editor Justin Richer (Bespoke Engineering)
Use cases collected
• Multiple portals
• Virtual patient registration
• Post-myocardial infarction implant and rehab
• VA secure RESTful use case
• Patient data for clinical and research purposes
• Primary care physician first appointment
• Alice selectively shares health-related data
with physicians and others
Deliverables:
All are in Implementer’s Draft status
HEART Profile for UMA
HEART Profile for OAuth 2.0
HEART Profile for OpenID Connect
HEART Profile
for UMA and
FHIR
HEART Profile
for OAuth 2.0
and FHIR
SECURITY
PROFILES
SEMANTIC
PROFILES
UMA-
RELATED
OIDC-
RELATED
OAUTH-
RELATED
Confidentiality, sensitivity, and
break-the-glass requirements
For confidentiality and sensitivity requirements,
we specified a scope mechanism
• For example, scope sens/ETH = “substance
abuse”
– Available to both OAuth and UMA
• If a resource server is capable of filtering out
substance abuse info with this scope:
– It MUST advertise this fact
– If a client brings it an access token WITHOUT this
scope, if it’s at all possible for it to do so, it
SHOULD redact the substance abuse info out of
the delivered resource
For break-the-glass, we similarly
specified a scope mechanism
• The scope is called btg
– Available to both OAuth and UMA
• Scope issuance is out of scope (sorry)
– UX options are of particular relevance in the UMA
case
• The resource server MUST log btg access in an
auditable format available to the resource
owner
The Move Health Data Forward
challenges
• Starting mid-2016, HHS ONC challenged
industry to create API solutions to help
individuals authorize the movement of their
health data
• Three phases later, several winners
have won awards, including for
some solutions
based on the
HEART
profiles
Questions?
Join us!
Thanks!
Eve Maler, WG co-chair
eve.maler@forgerock.com | @xmlgrrl
22 June 2017
http://openid.net/wg/heart/

More Related Content

What's hot

Why Do Federally Qualified Health Centers Need A Referral Management Software...
Why Do Federally Qualified Health Centers Need A Referral Management Software...Why Do Federally Qualified Health Centers Need A Referral Management Software...
Why Do Federally Qualified Health Centers Need A Referral Management Software...
GaryRichards30
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Arjen Noordzij
 
Electronic Medical Records: the now and the future of healthcare service
Electronic Medical Records: the now and the future of healthcare serviceElectronic Medical Records: the now and the future of healthcare service
Electronic Medical Records: the now and the future of healthcare service
doc_magno
 
Lt a srs ehr presentation
Lt a   srs ehr presentationLt a   srs ehr presentation
Lt a srs ehr presentationshortrnd
 
Securing_Medical_Devices_v3
Securing_Medical_Devices_v3Securing_Medical_Devices_v3
Securing_Medical_Devices_v3Steve Markey
 
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
HealthDev
 
Platform Description
Platform DescriptionPlatform Description
Platform DescriptionPlarent Ymeri
 
iUZ.Talk - Cross-border Interoperability
iUZ.Talk - Cross-border InteroperabilityiUZ.Talk - Cross-border Interoperability
iUZ.Talk - Cross-border Interoperability
iUZ_Technologies
 

What's hot (9)

Why Do Federally Qualified Health Centers Need A Referral Management Software...
Why Do Federally Qualified Health Centers Need A Referral Management Software...Why Do Federally Qualified Health Centers Need A Referral Management Software...
Why Do Federally Qualified Health Centers Need A Referral Management Software...
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
 
Portal Web Demo Customer
Portal Web Demo CustomerPortal Web Demo Customer
Portal Web Demo Customer
 
Electronic Medical Records: the now and the future of healthcare service
Electronic Medical Records: the now and the future of healthcare serviceElectronic Medical Records: the now and the future of healthcare service
Electronic Medical Records: the now and the future of healthcare service
 
Lt a srs ehr presentation
Lt a   srs ehr presentationLt a   srs ehr presentation
Lt a srs ehr presentation
 
Securing_Medical_Devices_v3
Securing_Medical_Devices_v3Securing_Medical_Devices_v3
Securing_Medical_Devices_v3
 
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
Aziz Boxwala, MD, Ph.D. SMART-on-FHIR specification & Sapphire demo.
 
Platform Description
Platform DescriptionPlatform Description
Platform Description
 
iUZ.Talk - Cross-border Interoperability
iUZ.Talk - Cross-border InteroperabilityiUZ.Talk - Cross-border Interoperability
iUZ.Talk - Cross-border Interoperability
 

Similar to Health Relationship Trust (HEART) Working Group 22 June 2017

Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
OnlineAudio Training
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability
Nrip Nihalani
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
kantarainitiative
 
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
Rowan Purdy
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...
Massimiliano Masi
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
CMDLearning
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
Vellore Institute of Technology
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
Plan de Calidad para el SNS
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...Duraiyarasan S
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
dbpublications
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
IMPULSE_TECHNOLOGY
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
Apollo Hospitals Group and ATNF
 
Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101
Lynne Frederickson
 
Lecture 6_Data acquisition.pptx power points
Lecture 6_Data acquisition.pptx power pointsLecture 6_Data acquisition.pptx power points
Lecture 6_Data acquisition.pptx power points
Josephmwanika
 
Federated architecture
Federated architectureFederated architecture
Federated architecture
ACCESS Health Digital
 

Similar to Health Relationship Trust (HEART) Working Group 22 June 2017 (20)

Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
Healthcare over Internet Protocol, Web 2.0, Health 2.0 and the Personal Healt...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
Secondary Use of Electronic Health Information – the Way to Guard Patient Sec...
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)8.2   Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
8.2 Demonstration Health - IT benifits - Bagmishika Puhan ( Session 8)
 
Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101Healthcare Data Ecosystem 101
Healthcare Data Ecosystem 101
 
Lecture 6_Data acquisition.pptx power points
Lecture 6_Data acquisition.pptx power pointsLecture 6_Data acquisition.pptx power points
Lecture 6_Data acquisition.pptx power points
 
Federated architecture
Federated architectureFederated architecture
Federated architecture
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Health Relationship Trust (HEART) Working Group 22 June 2017

  • 1. Health Relationship Trust (HEART) Working Group Eve Maler, WG co-chair eve.maler@forgerock.com | @xmlgrrl 22 June 2017 http://openid.net/wg/heart/
  • 2. Why? • Individuals want to gather, control, and share their health data – People want to be able to give permission for access – …and to change their minds • More and more, this data is sourced digitally – Such as from mobile apps and smart devices – This is especially so for complex health conditions • …and is stored in electronic records • Clinicians, insurers, and researchers want or need data access to diagnose, plan care, and pay for care • HEART puts the individual back at the center of the health data-sharing conversation
  • 3. WG goals and scope • RESTful health data sharing • Patient-centric, privacy-sensitive • Internationally applicable • Primarily profiling existing specs – OAuth, OpenID Connect, UMA, HL7’s FHIR API • Foster interoperable implementations • Not specifying a patient discovery mechanism • Not specifying trust frameworks
  • 4. Who takes part? • Health/health IT subject matter experts – E.g., SAMHSA, VA, HL7, doctors… • Technology experts – Implementers – Spec authors and editors • Leadership team: – Co-chair Debbie Bucci (HHS ONC) – Co-chair Eve Maler (ForgeRock) – Spec editor Justin Richer (Bespoke Engineering)
  • 5. Use cases collected • Multiple portals • Virtual patient registration • Post-myocardial infarction implant and rehab • VA secure RESTful use case • Patient data for clinical and research purposes • Primary care physician first appointment • Alice selectively shares health-related data with physicians and others
  • 6. Deliverables: All are in Implementer’s Draft status HEART Profile for UMA HEART Profile for OAuth 2.0 HEART Profile for OpenID Connect HEART Profile for UMA and FHIR HEART Profile for OAuth 2.0 and FHIR SECURITY PROFILES SEMANTIC PROFILES UMA- RELATED OIDC- RELATED OAUTH- RELATED
  • 8. For confidentiality and sensitivity requirements, we specified a scope mechanism • For example, scope sens/ETH = “substance abuse” – Available to both OAuth and UMA • If a resource server is capable of filtering out substance abuse info with this scope: – It MUST advertise this fact – If a client brings it an access token WITHOUT this scope, if it’s at all possible for it to do so, it SHOULD redact the substance abuse info out of the delivered resource
  • 9. For break-the-glass, we similarly specified a scope mechanism • The scope is called btg – Available to both OAuth and UMA • Scope issuance is out of scope (sorry) – UX options are of particular relevance in the UMA case • The resource server MUST log btg access in an auditable format available to the resource owner
  • 10. The Move Health Data Forward challenges • Starting mid-2016, HHS ONC challenged industry to create API solutions to help individuals authorize the movement of their health data • Three phases later, several winners have won awards, including for some solutions based on the HEART profiles
  • 11. Questions? Join us! Thanks! Eve Maler, WG co-chair eve.maler@forgerock.com | @xmlgrrl 22 June 2017 http://openid.net/wg/heart/

Editor's Notes

  1. Till July 18