SlideShare a Scribd company logo
This document is confidential and contains proprietary information, including trade secrets of CitiusTech. Neither the document nor any of the information
contained in it may be reproduced or disclosed to any unauthorized person under any circumstances without the express written permission of CitiusTech.
CitiusTech Thought
Leadership
14 December, 2018 | Author: Aniruddha Mandale , Rakesh Waghulde | Technical Lead,
Sr. Software Engineer
Implementation of Consent in Health
Information Exchange (HIE)
CitiusTech Thought
Leadership
2
Objective
 The issue of whether to what extent, and how individuals should have the ability to access and
control over their health information represents one of the foremost policy challenges related
to the electronic exchange of health information
 States and federal laws are engaged in facilitating the exchange of electronic health
information are struggling with a host of challenges, primarily on establishment of policies and
procedures for patient participation in their exchange efforts
 The purpose of this deck is to overcome the challenges faced by HIE’s while managing consent
for the patients by different methods and use cases
• To understand concept of consent management and types of concept in HIE (Health
Information Exchange)
• To illustrate five consent models, granularity and its types
• To explain payer and provider use case with use of consent models and granularity
 Until the time when we are confident that we can protect health information in a systematic
and thorough way, prudent use of the mechanism of consent appears to be one of the most
reliable ways to pursue that goal
 We are assuming that readers are already aware about HIE workflows and basic concepts of
consent
3
Agenda
 Consents in HIE
 Consent Management in HIE
 Consent Management Case Study
 The Five Consent Models
 Granularity and Choice
 Users and Roles in HIE
 Use Case for Consent Implementation
 Key Takeaways
 References
4
Consent in HIE
 In HIE, user access to patient data is controlled by consent which can be granted to users for
specific purposes of use at different levels and for a specific period of time (start and end time)
 The consent models at HIE range from No Consent, to Opt-out, Opt-out with Exceptions, to Opt-
in, and Opt-in with restrictions; or a combination of these models
 The selection of a Consent model is typically influenced by federal and state law, HIE policy, as
well as the input of stakeholders – providers, patients, public health, and others
 HIEs today collect consent preferences from patients using a number of methods which can be
categorized into two groups: directly from the patient to HIE and indirectly through the patient's
provider
 In both methods, the consent is collected from the patient (or the patient's authorized agent)
either electronically (such as on a web-based form), on paper, or orally (which may be in person,
or over the telephone)
 In general, consent is obtained (or not) at the provider point of care level, with educational
assistance regarding notification and consent options often facilitated by the relevant HIO
 The operational requirements of obtaining and managing consent in an HIE are influenced by the
consent model selected by the HIE
5
Consent Management in HIE
 The timely exchange of health information between health providers in an HIE to support care coordination is a
critical element of the National Quality Strategy and health reform efforts. However, privacy and confidentiality
concerns are currently limiting the inclusion of behavioral health data in electronic health information
exchange efforts
 The Office of the National Coordinator (ONC) for Health Information Technology encourages providers and
organizations involved in electronic health information exchange to develop policies and technical approaches
that offer patients more consent choices than simply having all or none of their information shared
 There are two ways consent can be managed in HIE’s – Consent to Access and Consent to Disclose
Consent to Access (and Display)
 Consent to Access preferences control if a provider can see any set of available records
 If you consider the patient’s entire set of records as a house, you can consider Consent to Access as a lock on
the front door (in this case the only door to enter the house from outside). So, if it is locked or Consent to
Access is N, the user is “stuck outside” and cannot view any of the patients’ records within the house
Consent to Disclose
 Consent to Disclose preferences control if a provider can see records that come from a specific data source
 In the house analogy, imagine that each room in the house stores contents from a specific data source, and
each of these rooms also has a door / lock on it. So if a user has achieved access to the house through the front
door, then they may or may not be allowed access to specific rooms based on Consent to Disclose preference
 If Consent to Disclose for any data source is N, then the user will be “stuck outside” that room and will not
have access to that room / data sources data
6
Consent Management Case Study (1/2)
 A patient, John Doe, visits various hospitals in HIE. He first goes to doctor Smith of InGen
hospital and gets a few medical tests done. These reports / documents are submitted to HIE.
We call these set of documents as D1. Later he goes to another facility Kandy and gets another
set of medical tests done. These reports are submitted to HIE. We will call these set of
documents as D2
 Whether a user can see documents from other facility or not, is decided by cumulative result
of Consent to Access and Consent to Disclose
As doctor Smith is currently logged in, he is from InGen workgroup, and his
Consent to Access is Yes. He can view documents in HIE based on Consent
to Disclose preference. As Consent to Disclose for both the workgroups
(Ingen and Kandy) is Yes, he can view D1 and D2 both
Case 1 Hospital Name Consent to Access Consent to Disclose
InGen(D1) Yes Yes
Kandy(D2) No Yes
7
Consent Management Case Study (2/2)
In this case, as Consent to Access is Yes for InGen, he can view documents
based on Consent to Disclose. As Consent to Disclose for Kandy workgroup
is No, he can’t view documents from Kandy workgroup
Case 2
Hospital Name Consent to Access Consent to Disclose
InGen(D1) Yes Yes
Kandy(D2) No No
In this case, as Consent to Access itself is No for both the hospitals, he can’t
view any of the document. In this case, Consent to Disclose would not be
considered
Case 3
Hospital Name Consent to Access Consent to Disclose
InGen(D1) No Yes
Kandy(D2) No Yes
8
The Five Consent Models (1/3)
 Based on various forms of electronic exchange in the U.S., as well as other sources in the public
domain, there are five core consent models:
• No consent
• Opt-out
• Opt-out with exceptions
• Opt-in
• Opt-in with restrictions
 These consent models are presented in order from “lowest” to “highest” in terms of reflecting
the extent to which consumer preferences are integrated and accommodated
 It is important to note that the models are intended to apply for participation in a HIE effort and
are not intended to imply constraints to the usual transmission which is paper or electronic type
of information for treatment, payment, or healthcare operation purposes as permitted under
HIPAA and other relevant federal and state laws
9
The Five Consent Models (2/3)
No Consent
 This model provides no opportunity to accommodate individual preference with respect to
participation in electronic exchange, so the health information of patients under the care of a
participating provider organization is automatically included in and available (often according to
certain rules) through the exchange
 Any provider can access the data for the patients in HIE
Opt-out
 In a typical Opt-out scenario, either the information of the patient who opts out is collected
through the exchange (used only for legally permitted purposes, such as public health reporting,
but never shared with other providers for clinical care), or the patient’s preferences are captured
and propagated such that his/her clinical information never enters the exchange
 In an Opt-out model a provision that patients must be given the opportunity to Opt-out fully
means all the patients have by default consent as Opt-in
Opt-out with Exceptions
 In an Opt-out with exceptions model, the default is that all or some pre-defined set of data is
eligible for exchange, but patients can either Opt-out fully (as described in Opt-out model) OR
selectively exclude categories of data / specific data elements from the exchange
 Limit exchange of their information to specific providers / provider organizations
 Limit exchange of their information for specific purposes like for payment, operations, treatment,
emergency etc.
10
Opt-in
 In an Opt-in model, the default is that no patient data are automatically made available for
electronic exchange
 In an Opt-in model a provision that patients must be given the opportunity to Opt-in fully means
all the patients have by default consent as Opt-out in Opt-in model
 Patients wishing to make all, or a pre-defined set, of their information available must actively
express their desire to participate.
Opt-in with Restrictions
 In an Opt-in with restrictions model, the default is that no patient data are automatically made
available for electronic exchange. Patients wishing to make all, or a pre-defined set, of their
information available for exchange must actively grant their consent to participate
 Patients have an option to include only specific categories of data or / data elements, enable
information to flow only to specific providers as well as allow their information to be exchanged
only for specific purposes
The Five Consent Models (3/3)
11
Granularity and Choice (1/3)
In numerous ways, and for a variety of reasons, patients participating in electronic exchange may
prefer to:
 Exert some control over the type and level of information that can be shared (Granularity by data
type);
 Restrict information accessed via electronic exchange to a limited (and potentially specified) set
of individuals or entities (Granularity by provider)
 Establish preferences for the given timeframe for which information could be accessed via
electronic exchange (Granularity by time range)
 Specify various purposes for which their information could be used via electronic exchange
(Granularity by purpose)
12
Granularity and Choice (2/3)
Granularity by Data Type
 One of the most commonly discussed issues in the context of HIE is whether patients should be
able to block specific data elements (e.g., a recent lab test), categories of data (e.g., all
medications) from being exchanged electronically
 Most HIE expressly exclude the exchange of sensitive information and do so because they do not
know how to interpret the various federal and state policies and regulations that apply to
sensitive information. Along with that they have not yet determined how best to handle the
technical and procedural challenges associated with data segmentation as well as they wish to
establish a basic level of trust before exchanging information considered as “sensitive”
Granularity by Provider
 One way of addressing consumer concern about electronic exchange is to restrict information
access to only those providers approved by the patient. This method is referred to as granularity
of consent by provider
 The patient is given the option to permit access to only specific provider or staff types (e.g., all
MDs and RNs could be granted access, but not office staff); or the patient is given the option to
restrict access at the provider entity level (e.g., primary care and cardiology practices are granted
access, but the allergist is not)
13
Granularity by Time Range
 An entity engaging in electronic exchange with HIE could make the determination that it is only
necessary to have the most recent clinical information available to providers and other partners
via exchange
 An entity engaging in electronic exchange could allow patients to apply a time range restriction
that corresponds to specific episodes of care that may be particularly “sensitive’ in nature (e.g., a
month spent in a rehabilitation clinic). In this case, provider access to all other clinical
information on the patient could be allowed, but any clinical information recorded between X
and Y dates would be blocked
 An entity engaging in electronic exchange could institute specific time-sensitive “use cases” that
enable information access only for a certain period of time
Granularity by Purpose
 The primary appeal of granularity by purpose is that, assuming patients choose to consent for
allowing their information to be used for treatment purposes, and unless this choice is coupled
with other granularity options, it enables all relevant clinical information to be made available via
electronic exchange
 With this type of consent, patients would have the option to consider all possible uses of their
information that is available via electronic exchange (e.g., care delivery, quality improvement,
clinical research, health services research), and then determine which uses would be acceptable
to them (i.e., consent to use of information for specified purposes only)
Granularity and Choice (3/3)
14
Users and Roles in HIE
Admin have all the rights as shown below, but caregiver can only view the records and change the
consent for a patient. Security Officer have rights for auditing the patient and provider logs history
View Patient Data
Manage Patient Consent
Patient
Audit History
Admin Settings
Provider (User)
Audit History
PE Admin
Caregiver
HIE Admin
Security
Officer
HIE Hospital
Roles
15
Use Case for Consent Implementation
The use case defines an access to patient data in HIE by Payers and Non-Payers (Hospitals) with set of
rules defined below:
1. With reference to granularity by purpose, the user (Payers) should only be able to see a patient in
HIE if:
• Consent status for payer is explicit Opt-in
• Consent is valid or a specified time range
2. Payer should not see data if:
• HIE consent model is complete Opt-out or complete Opt-in
• Payer consent is complete Opt-in model
• HIE consent is default or unknown
4. Payers cannot change:
• The HIE consent
• Their own consent if HIE consent model is Opt In
5. Payers can change their own consent if HIE consent is according to Opt-out model
6. Non-payers (Hospitals) can change the HIE consent or their own consent in both the Opt-out and
Opt-in models
7. Complete Opt-out model means any user can access the patient data and all patients have by
default consent as Opt-in
8. Complete Opt-in model means no user can access patient data unless consent is explicitly applied
16
Payer’s Consent to Access Patient (1/3)
Below is the flow chart which follows set of rules of consent implementation explaining all the use
cases of payer’s consent to access the patient information:
17
Payer’s Consent to Access Patient (Opt-in) (2/3)
18
Payer’s Consent to Access Patient (Opt-out) (3/3)
19
Non Payer’s Consent to Access Patient (1/3)
Below is the flow chart which follows set of rules of consent implementation explaining all the use
cases of non payer’s consent to access the patient information:
20
Non Payer’s Consent to Access Patient (Opt-in) (2/3)
21
Non Payer’s Consent to Access Patient (Opt-out) (3/3)
22
Key Takeaways
 Patients, providers, payers, HIEs, and other participants in electronic exchange efforts all have
something at stake in individual choice model decisions
 The choice of which patient consent model to apply for the purposes of electronic exchange will
have immediate implications for a variety of stakeholders, and possibly longer-term
consequences for national HIE goals
 The effects of consent related policy implementation at the state level are substantially similar,
except that states only have the legal power to mandate action within their geographic
boundaries and cannot contradict superseding federal law
 State laws supporting the use of No Consent models would essentially maintain the status quo;
laws mandating use of an Opt-out model would require entities to develop compliant policies;
and laws requiring use of an Opt-in model would demand alteration of the practices of all entities
currently using No Consent or Opt-out models
 The selection of consent models has to come with the level of granularity or combination of
multiple granularities to have patient chart access in an exchange
 The state can define their own consent policies according to federal laws like minor consent and
Participating Entity (PE) level consent
23
References
 https://www.healthit.gov/
 http://healthit.hhs.gov/portal/server.pt?open=512&mode=2&cached=true&objID=1147.
 http://www.himss.org/ihie-community-roundtable
 http://www.optuminsight.com/healthcare-connectivity/systems-integration/hie/
 http://www.markle.org/health/markle-common-framework
 http://healthit.hhs.gov/HISPC
 http://www.hawaiihmis.org/governance/consentprivacy-docs/
24
Thank You
Authors:
Aniruddha Mandale
Rakesh Waghulde
thoughtleaders@citiustech.com
About CitiusTech
2,900+
Healthcare IT professionals worldwide
1,200+
Healthcare software engineers
700+
HL7 certified professionals
30%+
CAGR over last 5 years
80+
Healthcare customers
 Healthcare technology companies
 Hospitals, IDNs & medical groups
 Payers and health plans
 ACO, MCO, HIE, HIX, NHIN and RHIO
 Pharma & Life Sciences companies

More Related Content

What's hot

Use of IT in the Hospitals
Use of IT in the HospitalsUse of IT in the Hospitals
Use of IT in the Hospitals
Yash Vardhan
 
Digital Health Care Technology
Digital Health Care TechnologyDigital Health Care Technology
Digital Health Care Technology
Nawanan Theera-Ampornpunt
 
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care DeliveryUsing Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Health Informatics New Zealand
 
EHR Implementation Plan Presentation
EHR Implementation Plan PresentationEHR Implementation Plan Presentation
EHR Implementation Plan Presentation
David Montanez, PMP
 
OpenEHR پرونده الکترونیک سلامت
OpenEHR  پرونده الکترونیک سلامتOpenEHR  پرونده الکترونیک سلامت
OpenEHR پرونده الکترونیک سلامت
ayyoubzadeh
 
Smart hospitals
Smart hospitalsSmart hospitals
Smart hospitals
Heba Moussa Hagrass
 
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Health Catalyst
 
Healthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and TechnologyHealthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and Technology
Health Catalyst
 
Health IT & Smart Hospitals (October 19, 2016)
Health IT & Smart Hospitals (October 19, 2016)Health IT & Smart Hospitals (October 19, 2016)
Health IT & Smart Hospitals (October 19, 2016)
Nawanan Theera-Ampornpunt
 
The business side of healthcare
The business side of healthcareThe business side of healthcare
The business side of healthcare
Latagia Copeland-Tyronce, MSW (Policy), BS(Hons.)
 
information technology in healthcare
information technology in healthcareinformation technology in healthcare
information technology in healthcare
Samiksha Parab
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)John Wang
 
Health Informatics: The Next Stethoscope in Healthcare
Health Informatics: The Next Stethoscope in HealthcareHealth Informatics: The Next Stethoscope in Healthcare
Health Informatics: The Next Stethoscope in Healthcare
Nawanan Theera-Ampornpunt
 
Telemedicine: An opportunity in Healthcare in India
Telemedicine: An opportunity in Healthcare in IndiaTelemedicine: An opportunity in Healthcare in India
Telemedicine: An opportunity in Healthcare in India
Amit Bhargava
 
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
Apollo Hospitals Group and ATNF
 
HL7 Standards
HL7 StandardsHL7 Standards
Introduction to Digital Health (EN)
Introduction to Digital Health (EN)Introduction to Digital Health (EN)
Introduction to Digital Health (EN)
Adriano Fontanari
 
Digital Health (March 14, 2018)
Digital Health (March 14, 2018)Digital Health (March 14, 2018)
Digital Health (March 14, 2018)
Nawanan Theera-Ampornpunt
 
Artificial intelligence in health care
Artificial intelligence in health careArtificial intelligence in health care
Artificial intelligence in health care
Sonja Aits
 

What's hot (20)

Use of IT in the Hospitals
Use of IT in the HospitalsUse of IT in the Hospitals
Use of IT in the Hospitals
 
Digital Health Care Technology
Digital Health Care TechnologyDigital Health Care Technology
Digital Health Care Technology
 
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care DeliveryUsing Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
Using Kaiser Permanente HealthConnect™ to Transform Primary Care Delivery
 
EHR Implementation Plan Presentation
EHR Implementation Plan PresentationEHR Implementation Plan Presentation
EHR Implementation Plan Presentation
 
OpenEHR پرونده الکترونیک سلامت
OpenEHR  پرونده الکترونیک سلامتOpenEHR  پرونده الکترونیک سلامت
OpenEHR پرونده الکترونیک سلامت
 
Smart hospitals
Smart hospitalsSmart hospitals
Smart hospitals
 
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
 
It in hospitals & HIS
It in hospitals & HISIt in hospitals & HIS
It in hospitals & HIS
 
Healthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and TechnologyHealthcare Interoperability: New Tactics and Technology
Healthcare Interoperability: New Tactics and Technology
 
Health IT & Smart Hospitals (October 19, 2016)
Health IT & Smart Hospitals (October 19, 2016)Health IT & Smart Hospitals (October 19, 2016)
Health IT & Smart Hospitals (October 19, 2016)
 
The business side of healthcare
The business side of healthcareThe business side of healthcare
The business side of healthcare
 
information technology in healthcare
information technology in healthcareinformation technology in healthcare
information technology in healthcare
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)
 
Health Informatics: The Next Stethoscope in Healthcare
Health Informatics: The Next Stethoscope in HealthcareHealth Informatics: The Next Stethoscope in Healthcare
Health Informatics: The Next Stethoscope in Healthcare
 
Telemedicine: An opportunity in Healthcare in India
Telemedicine: An opportunity in Healthcare in IndiaTelemedicine: An opportunity in Healthcare in India
Telemedicine: An opportunity in Healthcare in India
 
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
Smart Hospitals-The Smart Way of Treating and Healing-THIT 2015
 
HL7 Standards
HL7 StandardsHL7 Standards
HL7 Standards
 
Introduction to Digital Health (EN)
Introduction to Digital Health (EN)Introduction to Digital Health (EN)
Introduction to Digital Health (EN)
 
Digital Health (March 14, 2018)
Digital Health (March 14, 2018)Digital Health (March 14, 2018)
Digital Health (March 14, 2018)
 
Artificial intelligence in health care
Artificial intelligence in health careArtificial intelligence in health care
Artificial intelligence in health care
 

Similar to Implementation of Consent in Health Information Exchange (HIE)

Care data against
Care data   againstCare data   against
Care data against3GDR
 
Patient Resource: Medicare Observation Versus Admit Days
Patient Resource: Medicare Observation Versus Admit DaysPatient Resource: Medicare Observation Versus Admit Days
Patient Resource: Medicare Observation Versus Admit Days
Terri Embry RN BS
 
Quest for Value Deloitte
Quest for Value DeloitteQuest for Value Deloitte
Quest for Value Deloittekdexpressible
 
The Adoption of Personal Health Records by Consumers
The Adoption of Personal Health Records by ConsumersThe Adoption of Personal Health Records by Consumers
The Adoption of Personal Health Records by Consumers
Khaled El Emam
 
informed consent
informed consentinformed consent
informed consent
RamiAboali
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and Hardware
HridyanshSharma5
 
Hit Potential Peg Schible
Hit Potential   Peg SchibleHit Potential   Peg Schible
Hit Potential Peg Schible
pegscheible
 
Nationwide patient centric consent mgmt - v3 approved for public release old
Nationwide patient centric consent mgmt - v3  approved for public release oldNationwide patient centric consent mgmt - v3  approved for public release old
Nationwide patient centric consent mgmt - v3 approved for public release oldJeff McCloud
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
kendale
 
core ethics.pptx
core ethics.pptxcore ethics.pptx
core ethics.pptx
thanaram patel
 
Into the Great Wide Open: Introduction to Telemental Health Practice
Into the Great Wide Open: Introduction to Telemental Health PracticeInto the Great Wide Open: Introduction to Telemental Health Practice
Into the Great Wide Open: Introduction to Telemental Health Practice
Spectrum Health System
 
Rights of patients in india analysis and way ahead
Rights of patients in india analysis and way aheadRights of patients in india analysis and way ahead
Rights of patients in india analysis and way ahead
DR.RAJNI SHARMA
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
jeanettehully
 
Computerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdfComputerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdf
ssuserbed838
 
Assessing Employees’ Understanding of Liability Protections for .docx
Assessing Employees’ Understanding of Liability Protections for .docxAssessing Employees’ Understanding of Liability Protections for .docx
Assessing Employees’ Understanding of Liability Protections for .docx
festockton
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Informed consent
Informed consentInformed consent
Informed consent
ARUNAYESUDAS
 
Patient right
Patient rightPatient right
Patient right
anjalatchi
 

Similar to Implementation of Consent in Health Information Exchange (HIE) (20)

Kairon overview
Kairon overviewKairon overview
Kairon overview
 
Care data against
Care data   againstCare data   against
Care data against
 
Patient Resource: Medicare Observation Versus Admit Days
Patient Resource: Medicare Observation Versus Admit DaysPatient Resource: Medicare Observation Versus Admit Days
Patient Resource: Medicare Observation Versus Admit Days
 
Quest for Value Deloitte
Quest for Value DeloitteQuest for Value Deloitte
Quest for Value Deloitte
 
The Adoption of Personal Health Records by Consumers
The Adoption of Personal Health Records by ConsumersThe Adoption of Personal Health Records by Consumers
The Adoption of Personal Health Records by Consumers
 
informed consent
informed consentinformed consent
informed consent
 
Medical Software and Hardware
Medical Software and HardwareMedical Software and Hardware
Medical Software and Hardware
 
Hit Potential Peg Schible
Hit Potential   Peg SchibleHit Potential   Peg Schible
Hit Potential Peg Schible
 
Nationwide patient centric consent mgmt - v3 approved for public release old
Nationwide patient centric consent mgmt - v3  approved for public release oldNationwide patient centric consent mgmt - v3  approved for public release old
Nationwide patient centric consent mgmt - v3 approved for public release old
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
core ethics.pptx
core ethics.pptxcore ethics.pptx
core ethics.pptx
 
Into the Great Wide Open: Introduction to Telemental Health Practice
Into the Great Wide Open: Introduction to Telemental Health PracticeInto the Great Wide Open: Introduction to Telemental Health Practice
Into the Great Wide Open: Introduction to Telemental Health Practice
 
Rights of patients in india analysis and way ahead
Rights of patients in india analysis and way aheadRights of patients in india analysis and way ahead
Rights of patients in india analysis and way ahead
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
 
Computerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdfComputerized Clinical Decisions are supported by My Health Records..pdf
Computerized Clinical Decisions are supported by My Health Records..pdf
 
Assessing Employees’ Understanding of Liability Protections for .docx
Assessing Employees’ Understanding of Liability Protections for .docxAssessing Employees’ Understanding of Liability Protections for .docx
Assessing Employees’ Understanding of Liability Protections for .docx
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Informed consent
Informed consentInformed consent
Informed consent
 
Patient right
Patient rightPatient right
Patient right
 

More from CitiusTech

Member Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health PlansMember Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health Plans
CitiusTech
 
Evolving Role of Digital Biomarkers in Healthcare
Evolving Role of Digital Biomarkers in HealthcareEvolving Role of Digital Biomarkers in Healthcare
Evolving Role of Digital Biomarkers in Healthcare
CitiusTech
 
Virtual Care: Key Challenges & Opportunities for Payer Organizations
Virtual Care: Key Challenges & Opportunities for Payer Organizations Virtual Care: Key Challenges & Opportunities for Payer Organizations
Virtual Care: Key Challenges & Opportunities for Payer Organizations
CitiusTech
 
Provider-led Health Plans (Payviders)
Provider-led Health Plans (Payviders)Provider-led Health Plans (Payviders)
Provider-led Health Plans (Payviders)
CitiusTech
 
CMS Medicare Advantage 2021 Star Ratings: An Analysis
CMS Medicare Advantage 2021 Star Ratings: An AnalysisCMS Medicare Advantage 2021 Star Ratings: An Analysis
CMS Medicare Advantage 2021 Star Ratings: An Analysis
CitiusTech
 
Accelerate Healthcare Technology Modernization with Containerization and DevOps
Accelerate Healthcare Technology Modernization with Containerization and DevOpsAccelerate Healthcare Technology Modernization with Containerization and DevOps
Accelerate Healthcare Technology Modernization with Containerization and DevOps
CitiusTech
 
FHIR for Life Sciences
FHIR for Life SciencesFHIR for Life Sciences
FHIR for Life Sciences
CitiusTech
 
Leveraging Analytics to Identify High Risk Patients
Leveraging Analytics to Identify High Risk PatientsLeveraging Analytics to Identify High Risk Patients
Leveraging Analytics to Identify High Risk Patients
CitiusTech
 
FHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersFHIR Adoption Framework for Payers
FHIR Adoption Framework for Payers
CitiusTech
 
Payer-Provider Engagement
Payer-Provider Engagement Payer-Provider Engagement
Payer-Provider Engagement
CitiusTech
 
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
CitiusTech
 
Demystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingDemystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation Testing
CitiusTech
 
Progressive Web Apps in Healthcare
Progressive Web Apps in HealthcareProgressive Web Apps in Healthcare
Progressive Web Apps in Healthcare
CitiusTech
 
RPA in Healthcare
RPA in HealthcareRPA in Healthcare
RPA in Healthcare
CitiusTech
 
6 Epilepsy Use Cases for NLP
6 Epilepsy Use Cases for NLP6 Epilepsy Use Cases for NLP
6 Epilepsy Use Cases for NLP
CitiusTech
 
Opioid Epidemic - Causes, Impact and Future
Opioid Epidemic - Causes, Impact and FutureOpioid Epidemic - Causes, Impact and Future
Opioid Epidemic - Causes, Impact and Future
CitiusTech
 
Rising Importance of Health Economics & Outcomes Research
Rising Importance of Health Economics & Outcomes ResearchRising Importance of Health Economics & Outcomes Research
Rising Importance of Health Economics & Outcomes Research
CitiusTech
 
ICD 11: Impact on Payer Market
ICD 11: Impact on Payer MarketICD 11: Impact on Payer Market
ICD 11: Impact on Payer Market
CitiusTech
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
CitiusTech
 
Driving Home Health Efficiency through Data Analytics
Driving Home Health Efficiency through Data AnalyticsDriving Home Health Efficiency through Data Analytics
Driving Home Health Efficiency through Data Analytics
CitiusTech
 

More from CitiusTech (20)

Member Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health PlansMember Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health Plans
 
Evolving Role of Digital Biomarkers in Healthcare
Evolving Role of Digital Biomarkers in HealthcareEvolving Role of Digital Biomarkers in Healthcare
Evolving Role of Digital Biomarkers in Healthcare
 
Virtual Care: Key Challenges & Opportunities for Payer Organizations
Virtual Care: Key Challenges & Opportunities for Payer Organizations Virtual Care: Key Challenges & Opportunities for Payer Organizations
Virtual Care: Key Challenges & Opportunities for Payer Organizations
 
Provider-led Health Plans (Payviders)
Provider-led Health Plans (Payviders)Provider-led Health Plans (Payviders)
Provider-led Health Plans (Payviders)
 
CMS Medicare Advantage 2021 Star Ratings: An Analysis
CMS Medicare Advantage 2021 Star Ratings: An AnalysisCMS Medicare Advantage 2021 Star Ratings: An Analysis
CMS Medicare Advantage 2021 Star Ratings: An Analysis
 
Accelerate Healthcare Technology Modernization with Containerization and DevOps
Accelerate Healthcare Technology Modernization with Containerization and DevOpsAccelerate Healthcare Technology Modernization with Containerization and DevOps
Accelerate Healthcare Technology Modernization with Containerization and DevOps
 
FHIR for Life Sciences
FHIR for Life SciencesFHIR for Life Sciences
FHIR for Life Sciences
 
Leveraging Analytics to Identify High Risk Patients
Leveraging Analytics to Identify High Risk PatientsLeveraging Analytics to Identify High Risk Patients
Leveraging Analytics to Identify High Risk Patients
 
FHIR Adoption Framework for Payers
FHIR Adoption Framework for PayersFHIR Adoption Framework for Payers
FHIR Adoption Framework for Payers
 
Payer-Provider Engagement
Payer-Provider Engagement Payer-Provider Engagement
Payer-Provider Engagement
 
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
COVID19: Impact & Mitigation Strategies for Payer Quality Improvement 2021
 
Demystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingDemystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation Testing
 
Progressive Web Apps in Healthcare
Progressive Web Apps in HealthcareProgressive Web Apps in Healthcare
Progressive Web Apps in Healthcare
 
RPA in Healthcare
RPA in HealthcareRPA in Healthcare
RPA in Healthcare
 
6 Epilepsy Use Cases for NLP
6 Epilepsy Use Cases for NLP6 Epilepsy Use Cases for NLP
6 Epilepsy Use Cases for NLP
 
Opioid Epidemic - Causes, Impact and Future
Opioid Epidemic - Causes, Impact and FutureOpioid Epidemic - Causes, Impact and Future
Opioid Epidemic - Causes, Impact and Future
 
Rising Importance of Health Economics & Outcomes Research
Rising Importance of Health Economics & Outcomes ResearchRising Importance of Health Economics & Outcomes Research
Rising Importance of Health Economics & Outcomes Research
 
ICD 11: Impact on Payer Market
ICD 11: Impact on Payer MarketICD 11: Impact on Payer Market
ICD 11: Impact on Payer Market
 
Testing Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on HadoopTesting Strategies for Data Lake Hosted on Hadoop
Testing Strategies for Data Lake Hosted on Hadoop
 
Driving Home Health Efficiency through Data Analytics
Driving Home Health Efficiency through Data AnalyticsDriving Home Health Efficiency through Data Analytics
Driving Home Health Efficiency through Data Analytics
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Implementation of Consent in Health Information Exchange (HIE)

  • 1. This document is confidential and contains proprietary information, including trade secrets of CitiusTech. Neither the document nor any of the information contained in it may be reproduced or disclosed to any unauthorized person under any circumstances without the express written permission of CitiusTech. CitiusTech Thought Leadership 14 December, 2018 | Author: Aniruddha Mandale , Rakesh Waghulde | Technical Lead, Sr. Software Engineer Implementation of Consent in Health Information Exchange (HIE) CitiusTech Thought Leadership
  • 2. 2 Objective  The issue of whether to what extent, and how individuals should have the ability to access and control over their health information represents one of the foremost policy challenges related to the electronic exchange of health information  States and federal laws are engaged in facilitating the exchange of electronic health information are struggling with a host of challenges, primarily on establishment of policies and procedures for patient participation in their exchange efforts  The purpose of this deck is to overcome the challenges faced by HIE’s while managing consent for the patients by different methods and use cases • To understand concept of consent management and types of concept in HIE (Health Information Exchange) • To illustrate five consent models, granularity and its types • To explain payer and provider use case with use of consent models and granularity  Until the time when we are confident that we can protect health information in a systematic and thorough way, prudent use of the mechanism of consent appears to be one of the most reliable ways to pursue that goal  We are assuming that readers are already aware about HIE workflows and basic concepts of consent
  • 3. 3 Agenda  Consents in HIE  Consent Management in HIE  Consent Management Case Study  The Five Consent Models  Granularity and Choice  Users and Roles in HIE  Use Case for Consent Implementation  Key Takeaways  References
  • 4. 4 Consent in HIE  In HIE, user access to patient data is controlled by consent which can be granted to users for specific purposes of use at different levels and for a specific period of time (start and end time)  The consent models at HIE range from No Consent, to Opt-out, Opt-out with Exceptions, to Opt- in, and Opt-in with restrictions; or a combination of these models  The selection of a Consent model is typically influenced by federal and state law, HIE policy, as well as the input of stakeholders – providers, patients, public health, and others  HIEs today collect consent preferences from patients using a number of methods which can be categorized into two groups: directly from the patient to HIE and indirectly through the patient's provider  In both methods, the consent is collected from the patient (or the patient's authorized agent) either electronically (such as on a web-based form), on paper, or orally (which may be in person, or over the telephone)  In general, consent is obtained (or not) at the provider point of care level, with educational assistance regarding notification and consent options often facilitated by the relevant HIO  The operational requirements of obtaining and managing consent in an HIE are influenced by the consent model selected by the HIE
  • 5. 5 Consent Management in HIE  The timely exchange of health information between health providers in an HIE to support care coordination is a critical element of the National Quality Strategy and health reform efforts. However, privacy and confidentiality concerns are currently limiting the inclusion of behavioral health data in electronic health information exchange efforts  The Office of the National Coordinator (ONC) for Health Information Technology encourages providers and organizations involved in electronic health information exchange to develop policies and technical approaches that offer patients more consent choices than simply having all or none of their information shared  There are two ways consent can be managed in HIE’s – Consent to Access and Consent to Disclose Consent to Access (and Display)  Consent to Access preferences control if a provider can see any set of available records  If you consider the patient’s entire set of records as a house, you can consider Consent to Access as a lock on the front door (in this case the only door to enter the house from outside). So, if it is locked or Consent to Access is N, the user is “stuck outside” and cannot view any of the patients’ records within the house Consent to Disclose  Consent to Disclose preferences control if a provider can see records that come from a specific data source  In the house analogy, imagine that each room in the house stores contents from a specific data source, and each of these rooms also has a door / lock on it. So if a user has achieved access to the house through the front door, then they may or may not be allowed access to specific rooms based on Consent to Disclose preference  If Consent to Disclose for any data source is N, then the user will be “stuck outside” that room and will not have access to that room / data sources data
  • 6. 6 Consent Management Case Study (1/2)  A patient, John Doe, visits various hospitals in HIE. He first goes to doctor Smith of InGen hospital and gets a few medical tests done. These reports / documents are submitted to HIE. We call these set of documents as D1. Later he goes to another facility Kandy and gets another set of medical tests done. These reports are submitted to HIE. We will call these set of documents as D2  Whether a user can see documents from other facility or not, is decided by cumulative result of Consent to Access and Consent to Disclose As doctor Smith is currently logged in, he is from InGen workgroup, and his Consent to Access is Yes. He can view documents in HIE based on Consent to Disclose preference. As Consent to Disclose for both the workgroups (Ingen and Kandy) is Yes, he can view D1 and D2 both Case 1 Hospital Name Consent to Access Consent to Disclose InGen(D1) Yes Yes Kandy(D2) No Yes
  • 7. 7 Consent Management Case Study (2/2) In this case, as Consent to Access is Yes for InGen, he can view documents based on Consent to Disclose. As Consent to Disclose for Kandy workgroup is No, he can’t view documents from Kandy workgroup Case 2 Hospital Name Consent to Access Consent to Disclose InGen(D1) Yes Yes Kandy(D2) No No In this case, as Consent to Access itself is No for both the hospitals, he can’t view any of the document. In this case, Consent to Disclose would not be considered Case 3 Hospital Name Consent to Access Consent to Disclose InGen(D1) No Yes Kandy(D2) No Yes
  • 8. 8 The Five Consent Models (1/3)  Based on various forms of electronic exchange in the U.S., as well as other sources in the public domain, there are five core consent models: • No consent • Opt-out • Opt-out with exceptions • Opt-in • Opt-in with restrictions  These consent models are presented in order from “lowest” to “highest” in terms of reflecting the extent to which consumer preferences are integrated and accommodated  It is important to note that the models are intended to apply for participation in a HIE effort and are not intended to imply constraints to the usual transmission which is paper or electronic type of information for treatment, payment, or healthcare operation purposes as permitted under HIPAA and other relevant federal and state laws
  • 9. 9 The Five Consent Models (2/3) No Consent  This model provides no opportunity to accommodate individual preference with respect to participation in electronic exchange, so the health information of patients under the care of a participating provider organization is automatically included in and available (often according to certain rules) through the exchange  Any provider can access the data for the patients in HIE Opt-out  In a typical Opt-out scenario, either the information of the patient who opts out is collected through the exchange (used only for legally permitted purposes, such as public health reporting, but never shared with other providers for clinical care), or the patient’s preferences are captured and propagated such that his/her clinical information never enters the exchange  In an Opt-out model a provision that patients must be given the opportunity to Opt-out fully means all the patients have by default consent as Opt-in Opt-out with Exceptions  In an Opt-out with exceptions model, the default is that all or some pre-defined set of data is eligible for exchange, but patients can either Opt-out fully (as described in Opt-out model) OR selectively exclude categories of data / specific data elements from the exchange  Limit exchange of their information to specific providers / provider organizations  Limit exchange of their information for specific purposes like for payment, operations, treatment, emergency etc.
  • 10. 10 Opt-in  In an Opt-in model, the default is that no patient data are automatically made available for electronic exchange  In an Opt-in model a provision that patients must be given the opportunity to Opt-in fully means all the patients have by default consent as Opt-out in Opt-in model  Patients wishing to make all, or a pre-defined set, of their information available must actively express their desire to participate. Opt-in with Restrictions  In an Opt-in with restrictions model, the default is that no patient data are automatically made available for electronic exchange. Patients wishing to make all, or a pre-defined set, of their information available for exchange must actively grant their consent to participate  Patients have an option to include only specific categories of data or / data elements, enable information to flow only to specific providers as well as allow their information to be exchanged only for specific purposes The Five Consent Models (3/3)
  • 11. 11 Granularity and Choice (1/3) In numerous ways, and for a variety of reasons, patients participating in electronic exchange may prefer to:  Exert some control over the type and level of information that can be shared (Granularity by data type);  Restrict information accessed via electronic exchange to a limited (and potentially specified) set of individuals or entities (Granularity by provider)  Establish preferences for the given timeframe for which information could be accessed via electronic exchange (Granularity by time range)  Specify various purposes for which their information could be used via electronic exchange (Granularity by purpose)
  • 12. 12 Granularity and Choice (2/3) Granularity by Data Type  One of the most commonly discussed issues in the context of HIE is whether patients should be able to block specific data elements (e.g., a recent lab test), categories of data (e.g., all medications) from being exchanged electronically  Most HIE expressly exclude the exchange of sensitive information and do so because they do not know how to interpret the various federal and state policies and regulations that apply to sensitive information. Along with that they have not yet determined how best to handle the technical and procedural challenges associated with data segmentation as well as they wish to establish a basic level of trust before exchanging information considered as “sensitive” Granularity by Provider  One way of addressing consumer concern about electronic exchange is to restrict information access to only those providers approved by the patient. This method is referred to as granularity of consent by provider  The patient is given the option to permit access to only specific provider or staff types (e.g., all MDs and RNs could be granted access, but not office staff); or the patient is given the option to restrict access at the provider entity level (e.g., primary care and cardiology practices are granted access, but the allergist is not)
  • 13. 13 Granularity by Time Range  An entity engaging in electronic exchange with HIE could make the determination that it is only necessary to have the most recent clinical information available to providers and other partners via exchange  An entity engaging in electronic exchange could allow patients to apply a time range restriction that corresponds to specific episodes of care that may be particularly “sensitive’ in nature (e.g., a month spent in a rehabilitation clinic). In this case, provider access to all other clinical information on the patient could be allowed, but any clinical information recorded between X and Y dates would be blocked  An entity engaging in electronic exchange could institute specific time-sensitive “use cases” that enable information access only for a certain period of time Granularity by Purpose  The primary appeal of granularity by purpose is that, assuming patients choose to consent for allowing their information to be used for treatment purposes, and unless this choice is coupled with other granularity options, it enables all relevant clinical information to be made available via electronic exchange  With this type of consent, patients would have the option to consider all possible uses of their information that is available via electronic exchange (e.g., care delivery, quality improvement, clinical research, health services research), and then determine which uses would be acceptable to them (i.e., consent to use of information for specified purposes only) Granularity and Choice (3/3)
  • 14. 14 Users and Roles in HIE Admin have all the rights as shown below, but caregiver can only view the records and change the consent for a patient. Security Officer have rights for auditing the patient and provider logs history View Patient Data Manage Patient Consent Patient Audit History Admin Settings Provider (User) Audit History PE Admin Caregiver HIE Admin Security Officer HIE Hospital Roles
  • 15. 15 Use Case for Consent Implementation The use case defines an access to patient data in HIE by Payers and Non-Payers (Hospitals) with set of rules defined below: 1. With reference to granularity by purpose, the user (Payers) should only be able to see a patient in HIE if: • Consent status for payer is explicit Opt-in • Consent is valid or a specified time range 2. Payer should not see data if: • HIE consent model is complete Opt-out or complete Opt-in • Payer consent is complete Opt-in model • HIE consent is default or unknown 4. Payers cannot change: • The HIE consent • Their own consent if HIE consent model is Opt In 5. Payers can change their own consent if HIE consent is according to Opt-out model 6. Non-payers (Hospitals) can change the HIE consent or their own consent in both the Opt-out and Opt-in models 7. Complete Opt-out model means any user can access the patient data and all patients have by default consent as Opt-in 8. Complete Opt-in model means no user can access patient data unless consent is explicitly applied
  • 16. 16 Payer’s Consent to Access Patient (1/3) Below is the flow chart which follows set of rules of consent implementation explaining all the use cases of payer’s consent to access the patient information:
  • 17. 17 Payer’s Consent to Access Patient (Opt-in) (2/3)
  • 18. 18 Payer’s Consent to Access Patient (Opt-out) (3/3)
  • 19. 19 Non Payer’s Consent to Access Patient (1/3) Below is the flow chart which follows set of rules of consent implementation explaining all the use cases of non payer’s consent to access the patient information:
  • 20. 20 Non Payer’s Consent to Access Patient (Opt-in) (2/3)
  • 21. 21 Non Payer’s Consent to Access Patient (Opt-out) (3/3)
  • 22. 22 Key Takeaways  Patients, providers, payers, HIEs, and other participants in electronic exchange efforts all have something at stake in individual choice model decisions  The choice of which patient consent model to apply for the purposes of electronic exchange will have immediate implications for a variety of stakeholders, and possibly longer-term consequences for national HIE goals  The effects of consent related policy implementation at the state level are substantially similar, except that states only have the legal power to mandate action within their geographic boundaries and cannot contradict superseding federal law  State laws supporting the use of No Consent models would essentially maintain the status quo; laws mandating use of an Opt-out model would require entities to develop compliant policies; and laws requiring use of an Opt-in model would demand alteration of the practices of all entities currently using No Consent or Opt-out models  The selection of consent models has to come with the level of granularity or combination of multiple granularities to have patient chart access in an exchange  The state can define their own consent policies according to federal laws like minor consent and Participating Entity (PE) level consent
  • 23. 23 References  https://www.healthit.gov/  http://healthit.hhs.gov/portal/server.pt?open=512&mode=2&cached=true&objID=1147.  http://www.himss.org/ihie-community-roundtable  http://www.optuminsight.com/healthcare-connectivity/systems-integration/hie/  http://www.markle.org/health/markle-common-framework  http://healthit.hhs.gov/HISPC  http://www.hawaiihmis.org/governance/consentprivacy-docs/
  • 24. 24 Thank You Authors: Aniruddha Mandale Rakesh Waghulde thoughtleaders@citiustech.com About CitiusTech 2,900+ Healthcare IT professionals worldwide 1,200+ Healthcare software engineers 700+ HL7 certified professionals 30%+ CAGR over last 5 years 80+ Healthcare customers  Healthcare technology companies  Hospitals, IDNs & medical groups  Payers and health plans  ACO, MCO, HIE, HIX, NHIN and RHIO  Pharma & Life Sciences companies