[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Security Interoperability Pilot (fwd)



Might be a nice way to integrate HRAC into current "mainstream" Healthcare
Informatic efforts.  Let me know if you think this would be a good idea
and I'll facilitate introducing HRAC to WEDI and the other participants.

FYI,
Mary

----------------------------------------------------------------- 
Mary E. Kratz 
University of Michigan Health System 
Medical Center Information Technology - Special Projects Division 
4251 Plymouth Road, Suite 3300 Ann Arbor, MI 48105-2785 
mkratz@umich.edu
v:(734)763-6871 f:(734)998-6806


---------- Forwarded message ----------
Date: Wed, 25 Nov 1998 15:26:31 -0600
From: kepa.zubeldia@envoy-neic.com
To: dan.proctor@passporthealth.com, moertel.david@mayo.edu,
    e-authentication@secstate.wa.gov, ed@officemed.com,
    Gcarruth@phxl.bcbsaz.com, john.fraser@mhdi.org, DigSig@state.ut.us,
    Larry.Watkins@per-se.com, phardin@actamed.com, AFEHCT@aol.com,
    bkillian@uhin.com, JParmigiani@hcfa.gov, pthaler@actamed.com,
    Schups@aol.com, mkratz@umich.edu, llorton@hostnet.org,
    Kepa.Zubeldia@envoy-neic.com, robert.poiesz@highmark.com,
    beatty.gary@mayo.edu, bob@pdxinc.com, DSCHINDE@corp.stjoe.org,
    jim.klein@eds.com, rcowling@swbell.net, margaret.weiker@eds.com,
    bruce_horn@AICI.COM, DaveZimmerman@mede.com, Deanna.Hanks@medaphis.com,
    Don.Bechtel@HDX.com, Gordon_Romney@arcanvs.com
Subject: Security Interoperability Pilot

The WEDI (http://www.wedi.org/) annual meeting ended last Thursday.  The 
main topic of the meeting was the implementation of the Administrative 
provisions of HIPAA, including security, that are due in the next two 
years.  Take a look at WEDI's web site for copies of the presentations in 
the next few days.

One of the highlights of the meeting was the presentation by John 
Parmigiani of HCFA of the upcoming HCFA Internet Use Policy.  This new 
policy, still in Draft (attached) should be released in the next week or 
so.  The significance is that ir reverses a long standing HCFA policy that 
forbids the use of the Internet.  With the new policy we will be able to 
use the Internet as long as certain security measures are taken.  Also, the 
new HCFA policy will be in compliance with the security NPRM of HIPAA and HCFA 
will make whatever changes are necessary to be in compliance with the final 
rules once the final rules are published.

While the security and digital signature provisions of HIPAA apply to the 
entire industry, the HCFA Internet Use Policy applies to all HCFA Privacy 
Act-protected and other sensitive HCFA data being sent over the Internet, 
regardless of the end points (nodes) of the paths.  In spite of only being a 
HCFA policy and not a HIPAA policy, it will certainly become a model for the 
entire industry as far as encryption and authentication/identification is 
concerned.

Both the HCFA Internet Use Policy and the HIPAA proposed rules are 
technology independent and leave it up to the industry to determine what is 
the way we will implement the requirements.  While it is great to have this 
flexibility, we must also be aware of the potential interoperability 
problems that could arise with this rapidly changing technology.

For this reason, we are proposing an interoperability pilot to be run in 
the next few months, to see if we, as an industry, can reach a consensus on 
how we will address this particular challenge.  If we cannot reach an 
industry consensus, we will have to gear up for a multitude of encryption 
and authentication solutions.

There are currently several efforts attempting to build industry consensus 
on different aspects of the HIPAA security rules.  For example, the effort 
under HOST to define security policies and Protection Profiles which are 
the basis for the application of security to specific situations.  The 
EHNAC is working on a voluntary security accreditation program.  Also, 
AFEHCT will be preparing a HIPAA Security Compliance Kit to assist small 
providers in their security compliance efforts.

The pilot proposed during the WEDI meeting, in conjunction with AFEHCT and 
HCFA, is to develop an industry consensus on the practical use of 
encryption and digital signatures to satisfy the requirements of both the 
HCFA policy and the HIPAA rules.

My initial thoughts are that it should involve the participation of several 
Payers, PMS Vendors, Clearinghouses, and Providers.  These participants 
should independently implement the encryption agreed for the pilot.  The 
agreed encryption (and possibly digital signatures for data integrity) 
should be based or aligned with one of the protection profiles defined by 
the efforts under HOST.  AFEHCT will participate by providing the technical 
coordination of the pilot.  It is envisioned that the pilot, one finalized, will
have established parameters that ensure test boundaries in accordance with 
HCFA's Internet policy.

All the participants at the WEDI meeting responded very favorably to this 
challenge, as we all realize that not having consensus in this matter will 
be very expensive for the entire industry.  Some of the comments centered 
on the importance to keep it an open process and open technology, and also 
to solicit the participation of the different State regulators, so whatever 
the industry adopts is also in compliance with the different Digital 
Signature and Electronic Commerce Acts that have been passed at the state 
level.

In principle we are targeting the first meeting in Washington DC December 
15 or 16, piggy-back at the end of the AFEHCT meeting.  Same hotel, etc.  
See the info at http://www.afehct.org/ for meeting logistics.  We have not 
yet determined whether it will be Tuesday afternoon or running into 
Wednesday.  I will be sending another email with these details.

Right now the thoughts are leaning towards a relatively short pilot, with 
two phases, maybe 3-4 months each, starting around the first of the year.  
There should be several teams (Payer, vendor, provider, clearinghouse) that 
independently proceed to implement the agreed solution, and a second phase 
to test the interoperability of the independent implementations.  At then 
end of this we should have an agreed solution that would work for all 
players.

The meeting in DC should have two parts.  A first part of proposed 
technologies and solutions, and a second part of moderated discussion to 
see if we can agree on one or more solutions.  The reason why I say one or 
more is because we may need a solution for batch and another solution for 
real-time transactions.  Also, we may want to look at parameters to be used with
web-browser (SSL/TLS) solutions, as this is a common environment today. Ideally 
one solution for everything would be best, but I doubt that is possible.  It 
will be great if we agree on only one for batch and another for real time, but I
am not holding my breath on that either.

Over the next few days I will be putting together a mailing list.  If you 
think of someone that should be in it, let me know.  Then I will be working 
with the security group at AFEHCT and HCFA, and other volunteers, to put 
together the agenda, and identify the resources we need.  In about one week 
you should be receiving another email from me with the details.

One thing I am looking for at this time are candidate technologies and 
products, and people willing to make a presentation on them with 
understanding of the healthcare environment, so we can make the meeting as 
efficient as possible.

This is a totally practical, pragmatic, hands-on pilot.  The purpose is to 
try to reach a consensus on how we are going to use encryption and digital 
signatures and authentication/identification in healthcare.  The issues 
concerning the very important matters of policies and procedures and 
protection profiles will be addressed in other forums (i.e. HOST).  So, I 
am looking for skilled technical people that can actually take charge of 
implementing this technology within their corporation.  Before coming to 
the meeting, these people should be informed in the technology options, 
what will work for them and what will not work, and bring a level of 
corporate support to endorse and carry out the pilot, and the resulting 
outcome.

Finally, I would like to stress the importance of formulating a strong 
evaluation plan that not only examines all aspects of interoperability but also 
feasibility considerationsfor implementation across the industry.

By now you should have an idea of what we ar trying to do and what the 
focus is.  At this time it is best not to have too much structure and wait 
for the first meeting to define the rest.  So, here is your invitation to 
participate.  Interested ?  drop me a line.  Not interested ? let me know 
and I will remove you from this list.

Kepa Zubeldia
ENVOY Corporation


WordPerfect 6.1