SlideShare a Scribd company logo
1 of 20
FHIR +
OAuth2
Kevin Mayfield
Information
Governance
(Why FHIR)
Confidentiality
 Data Protection 1998
 Data Protection Principles
 Processed fairly and lawfully
 Processed for specified purposes
 Adequate, relevant and not excessive
 Accurate and kept up-to-date
 Not kept for longer than necessary
 Processed in accordance with the rights of data
subjects
 Protected by appropriate security (practical and
organisational)
 Not transferred outside the EEA without adequate
protection
Patient Choices
 Consent/Dissent to share
 Sealing
 Sealing and Locking
 Consent/Dissent to store
Information Security
(INFOSEC)
 Confidentiality
 Information must be secured against
unauthorised modification
 Integrity
 Information must be safeguarded against
unauthorised modification
 Availability
 Information must be accessible to
authorised users at times when they
require it.
Current Situation
Extract, Transform and Load
Trust Integration Engine
FHIR Mission
Resource API
Document
Repository
TIE / API Router
Laboratory
Information
System
PAS / EPR
NHS England
(Spine, CP-IS,
FGM, etc)
GP and Community Record
OAuth 2
FHIR
Trusted
Applications
Resource Owner Password Credentials Grant
Enterprise Integration
everywhere
TIE (API
Router)
EDMS
PAS
Dictation
Vital
Signs
PAS
Web
Patient Identity
Feed (HL7v2)
Provide Documents
(HL7 FHIR)
Provide Documents
(HL7 FHIR)
Retrieve Document
(HL7 FHIR)
Retrieve Document
(HL7 FHIR)Patient Demographic
Query (SQL)
Patient Demographic
Query (HL7 FHIR) Document Registry
Query (HL7 FHIR)
Resource Owner Password
Credentials Grant
Client
App
Auth
Server
Resource
Server
Access Token Request
Access Token Response
GET Patient – Resource Request
Protected Response
Oauth2
Resource
Web Server
Applications
Authorisation Code Grant
Document Sharing (Local)
Cross
Enterprise
Document
Registry (XDS
+FHIR)
GP
Document
Repository
Social
Services
Dcoument
Repository
Acute
Document
Repositories
Mental
Health Doc
Repository
GP
Document
Repository
GP
Document
Repository
Consent/Dissent to share
Sealing
Sealing and Locking
Consent/Dissent to store
Patient Consent
Consultant
Nurse
GP
Social Worker
Health worker Role
Community, Acute, Sexual Health,
Child Services, Social Service,
GP, Mental, etc
Service
Authorisation Code Grant
Flow
Client
App
Auth
Server
Resource
Server
Access Token Request
Access Token Response
‘GET CarePlan’ – Resource Request
Protected Response
Oauth2
Resource
User (or
Patient
Consent)
Authorisation Request
Redirect for authorisation
Login and consent
Authorisation Code
Patient Consent
Stack
Any Questions
Mayfield.g.kev@gmail.com
+44 (0) 771 888 1774
Skype: kevingmayfield
Twitter: KevinGMayfield
www.mayfield-is.co.uk

More Related Content

What's hot

Agility v7.0-rro
Agility v7.0-rroAgility v7.0-rro
Agility v7.0-rroRex Osborn
 
Indices, Registries, And Databases
Indices, Registries, And DatabasesIndices, Registries, And Databases
Indices, Registries, And DatabasesLori Powers
 
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...Smarter Planet Students for a
 
Diagnotes open app challenge - phase 1 submission
Diagnotes   open app challenge - phase 1 submissionDiagnotes   open app challenge - phase 1 submission
Diagnotes open app challenge - phase 1 submissionDiagnotes
 
Healthcare by Any Other Name - Centricity Business Whitepaper
Healthcare by Any Other Name - Centricity Business WhitepaperHealthcare by Any Other Name - Centricity Business Whitepaper
Healthcare by Any Other Name - Centricity Business WhitepaperGE Healthcare - IT
 
ACR Select: Clinical Decision Support Imaging Guidelines
ACR Select: Clinical Decision Support Imaging GuidelinesACR Select: Clinical Decision Support Imaging Guidelines
ACR Select: Clinical Decision Support Imaging GuidelinesACR Select
 
The Digital Innovation Award - DocDoc
The Digital Innovation Award - DocDocThe Digital Innovation Award - DocDoc
The Digital Innovation Award - DocDocThe Digital Insurer
 
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Brian Ahier
 
How BPM+ Health Complements FHIR
How BPM+ Health Complements FHIRHow BPM+ Health Complements FHIR
How BPM+ Health Complements FHIRDenis Gagné
 
Course Share Presentation
Course Share PresentationCourse Share Presentation
Course Share Presentationtang76
 
Impact of HEDIS on Health Plans
Impact of HEDIS on Health PlansImpact of HEDIS on Health Plans
Impact of HEDIS on Health PlansCitiusTech
 
Meaningful Use - 8/2010
Meaningful Use - 8/2010Meaningful Use - 8/2010
Meaningful Use - 8/2010rogersons
 
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care DeliveryUsing Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care DeliveryHealth Informatics New Zealand
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009rogersons
 
Direct Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse DirectoriesDirect Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse DirectoriesBrian Ahier
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare Systemmarcnellen
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 

What's hot (20)

Agility v7.0-rro
Agility v7.0-rroAgility v7.0-rro
Agility v7.0-rro
 
Indices, Registries, And Databases
Indices, Registries, And DatabasesIndices, Registries, And Databases
Indices, Registries, And Databases
 
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...
IBM Smarter Healthcare presentation - Angus Campbell - Smarter planet comes t...
 
Diagnotes open app challenge - phase 1 submission
Diagnotes   open app challenge - phase 1 submissionDiagnotes   open app challenge - phase 1 submission
Diagnotes open app challenge - phase 1 submission
 
Healthcare by Any Other Name - Centricity Business Whitepaper
Healthcare by Any Other Name - Centricity Business WhitepaperHealthcare by Any Other Name - Centricity Business Whitepaper
Healthcare by Any Other Name - Centricity Business Whitepaper
 
Revenue Cycle Management
Revenue Cycle ManagementRevenue Cycle Management
Revenue Cycle Management
 
ACR Select: Clinical Decision Support Imaging Guidelines
ACR Select: Clinical Decision Support Imaging GuidelinesACR Select: Clinical Decision Support Imaging Guidelines
ACR Select: Clinical Decision Support Imaging Guidelines
 
The Digital Innovation Award - DocDoc
The Digital Innovation Award - DocDocThe Digital Innovation Award - DocDoc
The Digital Innovation Award - DocDoc
 
Himss12 Meet The Expert
Himss12 Meet The ExpertHimss12 Meet The Expert
Himss12 Meet The Expert
 
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
Direct 2.0 Boot Camp: Deep Dive Into the Direct Trusted Agent Accreditation P...
 
E Health Trust
E Health TrustE Health Trust
E Health Trust
 
How BPM+ Health Complements FHIR
How BPM+ Health Complements FHIRHow BPM+ Health Complements FHIR
How BPM+ Health Complements FHIR
 
Course Share Presentation
Course Share PresentationCourse Share Presentation
Course Share Presentation
 
Impact of HEDIS on Health Plans
Impact of HEDIS on Health PlansImpact of HEDIS on Health Plans
Impact of HEDIS on Health Plans
 
Meaningful Use - 8/2010
Meaningful Use - 8/2010Meaningful Use - 8/2010
Meaningful Use - 8/2010
 
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care DeliveryUsing Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009
 
Direct Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse DirectoriesDirect Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse Directories
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare System
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 

Similar to HL7 FHIR plus OAuth2 in a NHS trust

A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security Jeff Horsager
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Health information security system
Health information security systemHealth information security system
Health information security systemDiana Fernandez
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...eFax Corporate®
 
What Are The HIPAA Rules And How To Ensure HIPAA Compliance
What Are The HIPAA Rules And How To Ensure HIPAA ComplianceWhat Are The HIPAA Rules And How To Ensure HIPAA Compliance
What Are The HIPAA Rules And How To Ensure HIPAA ComplianceEMed HealthTech Pvt Ltd
 
Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5agropper
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Saide OER Africa
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
Information governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsInformation governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsHANDI HEALTH
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Lumension
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Approach to enable your IT systems for FHIR (HL7 standards) compliance
Approach to enable your IT systems for FHIR (HL7 standards) complianceApproach to enable your IT systems for FHIR (HL7 standards) compliance
Approach to enable your IT systems for FHIR (HL7 standards) complianceShubaS4
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
These standards are taken from the HL7 Functional Standards for an.docx
These standards are taken from the HL7 Functional Standards for an.docxThese standards are taken from the HL7 Functional Standards for an.docx
These standards are taken from the HL7 Functional Standards for an.docxbarbaran11
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 

Similar to HL7 FHIR plus OAuth2 in a NHS trust (20)

A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
 
What Are The HIPAA Rules And How To Ensure HIPAA Compliance
What Are The HIPAA Rules And How To Ensure HIPAA ComplianceWhat Are The HIPAA Rules And How To Ensure HIPAA Compliance
What Are The HIPAA Rules And How To Ensure HIPAA Compliance
 
Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5Privacy on FHIR Demo at HIMSS!5
Privacy on FHIR Demo at HIMSS!5
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Information governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsInformation governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applications
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Approach to enable your IT systems for FHIR (HL7 standards) compliance
Approach to enable your IT systems for FHIR (HL7 standards) complianceApproach to enable your IT systems for FHIR (HL7 standards) compliance
Approach to enable your IT systems for FHIR (HL7 standards) compliance
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
These standards are taken from the HL7 Functional Standards for an.docx
These standards are taken from the HL7 Functional Standards for an.docxThese standards are taken from the HL7 Functional Standards for an.docx
These standards are taken from the HL7 Functional Standards for an.docx
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

HL7 FHIR plus OAuth2 in a NHS trust

Editor's Notes

  1. <Hello’s> This morning I’m going to over our two year journey with FHIR, how it is changing our architecture and especially our use of Oauth2 to secure
  2. First of all we will run through why are moving to FHIR, it’s not because it’s a new technology. We are using it because it solves problems, more specifically Information Governance Issues.
  3. Information Governance provides confidentiality, from a legal perspective this is driven by Data Protection Act 1998. The principles are shown here but I’m not going into detail of them.
  4. Let us first look at specific areas in particular the choices the patient has on contolling informaion. In England this is: Sealing - For example, suppose that John attends a genito-urinary medicine clinic. He is found to be suffering from syphilis. John asks for the diagnosis to be sealed. The next time he goes to the clinic, he sees a different doctor and that doctor is able to see the information (although she is informed that the syphilis diagnosis and the associated information is sealed). An appointment is made for John to see the ophthalmologist. The ophthalmologist looks on the computer for the history of diagnoses recorded for John. All of John's diagnoses are revealed apart from syphilis. An icon is displayed to show that some information has been withheld. Locking – Is stronger form of sealing and the ophthalmologist would not be aware it’s existence. http://systems.hscic.gov.uk/infogov/confidentiality/choices
  5. Confidential. Rules that limit access to information. Passwords, authentication Integrity. Information isn’t tampered with and trust worthy. Access controls. Availability – Reliable access to authorised people. Protecting against failure such as clustering.
  6. Having had brief look at information governance. Lets move onto the two common patterns for handling patient information
  7. In England this is a very common practice and is found from small organisations such as primary care groups to very large acute trusts. It’s prime use is statutory reporting e.g. GP Data. GP Data was a recent initiative to extract primary care data from GP systems for payments, reporting and research. This faced widespread criticism from GP’s, patients mostly around confidentiality, concerns of the intended use and the project is now under review. It is also a common method of feeding data warehouses and central repositories mainly especially in smaller organisations who tend to have little experience of integration – they will use tools they know. As ETL tends to be over night processes, these HIE tend to not show current information – the current information is not available
  8. This is a pattern many of us will be familiar with – messaging. Typical messaging used with a NHS Trust. Information is distributed to many recipients regardless of a legitimate relationship between the service/system and the patient. Still a valid pattern but has IG concerns, e.g. can’t carry sexual health encounters, can’t distribute addresses for children in protected care, etc. Also what happens if information is wrong. Say a patient diagnosed as an alcoholic and this has been distributed to many systems (in one case I am aware of the doctor thought the patient may be a alcholic, the ‘thought’ was lost. How does the patient correct or seal this information? This pattern is still valid, it solves a number of problems and we intend to carry on with it especially around ADT
  9. But we have many areas where we need other solutions and this is where FHIR comes
  10. One solution to these problems is the resource API. Promotes confidentiality by limit the distribution and instead provide api’s for the current information to be retrieved. Maintain the integrity by using access controls provided by OAuth2 which fits well with this pattern. Resource API can be easily clustered to aid availability and is directly accessing source systems returning current information. FHIR supports a resource API –this is one of the main reasons we began using it was chosen, we needed a resource API to help solve IG issues. We’ve had concerns about FHIR’s DSTU status but the pattern was correct and what do you use instead?
  11. Resource API + FHIR helps us with the availability of information but how do we go about securing the information.
  12. <Describe diagram – highlight HL7v2 stil being used.> Moving to resource API we have utlilised open source such as Apache Camel, ServiceMix and Tomcat to move polling (describe) and chatty (complex - describe) API’s from running across the network. We have now moved this nearer the source and effectively created microservices that produce FHIR. This change in topology removing transformation and gateways from the central TIE to many micro-services with centralised routing and BP, has proved robust and easier to maintain butit has increased the security overhead. This is where OAuth2 comes in.
  13. Each ESB or TIE is protected by Oauth2 or more specifically a OAuth2 resource server. To access the resource you need an access token. <describe diagram>
  14. The resource owner grant works for trusted applications but going back to the original requirement we need to finer level of controls on top of the resources. The availability of a resource will depend on who is asking for it, what the data is and what controls the patient has placed on it.
  15. I’m not going to go into details on web apps accessing resources but instead concentrate on an example of document sharing we used with a Health Information Exchange in Edinburgh, Scotland. This was a community initiative to share data between acute, community and social services. The documents being shared included patient assessments and referrals. This is very similar to normal IHE XDS pattern.
  16. Although it was very easy to quickly find an appropriate pattern (xds) and select the api. It was far harder to get the information governance in place. Citizens had address that were confidential – battered wives, kids taken into care. Concerns information shared with social services would be made available to other council/governent departments. Patients may release information to NHS that didn’t want shared with Social services. <Run through slide>
  17. <run through diagram> The main candidate for authentication is the existing NHS Spine Directory Services which provides authentication services via smartcard and a LDAP database. This provides a database of users, their roles and what specialty they work in. So we can now use more complex filter to protect roles, we can protect a a resource based what type of information is being protected and restrict access based a users role and their specialty – so we can ensure only practitioners in sexual health can access information about sexual health. However this leaves patients consent/dissent to deal with.
  18. We’ve still not covered Patient Consent. In Scotland we collected consent as part of the referral process but one idea is to use the same authorisation grant and allow the patient to consent or dissent to sharing via Patient Portals. In the example shown here, the ‘Jorvik NHS trust’ is request access to data stored on the popular cycling/running app Strava or the more familiar facebook request for permission. In practice the authorisations would be down to local design but could include consents to: share data with NHS trusts, social services, NHS England Summary Care and GP Data.
  19. We have used numerous tools to implement OAuth2. The stack is primarily open source and Java based. Using spring security allows us to customize and adopt the rules without disturbing the other layers too much.