IUPUI School of Computing and Informatics S644 / I635 Consumer Health Informatics Week 12: The Patient Record and Online Health Information Security Contents Week 12 Learning Goals and Objectives....................................................................................................... 1 Week 12 Introduction ................................................................................................................................... 2 Week 12 Readings ......................................................................................................................................... 5 Week 12 Independent Learning Activities .................................................................................................... 6 Week 12 Forum Discussion ........................................................................................................................... 6 Week 12 Learning Goals and Objectives Define, describe and provide examples of ‘provider-centric’ and ‘consumer-centric’ information systems. Debate the pros and cons of provider-centric versus consumer-centric information systems. Explore the current debate over and trends toward the implementation of the personal health record. Explore the roles of individuals, and private, regional, state or national organizations / government in the oversight or administration of healthcare information. Differentiate between privacy, confidentiality, and security in the context of CHI and within information environments. Appropriately apply the concepts of privacy, confidentiality, and security and related relevant issues within the context of consumer health informatics. Discuss, describe and apply the principles of information security to consumer health informatics applications. Discuss, describe and apply the principles of information security within the context of the personal health record. 1 Week 12 Introduction Welcome back after your independent study week! Week 12 ends Module D: Challenges and Issues in CHI. Over the past few weeks (10 12) we looked beneath the surface to explore deeper economic, ethical and social issues that influence the adoption of consumer health informatics tools in healthcare settings. This week we will continue our discussion of security, privacy and confidentiality in consumer health informatics, extending it to technical questions surrounding the security of electronic health information. Years ago, the California HealthCare Foundation conducted a survey of 2,000 consumers on their health and privacy concerns. Please review the document: http://www.chcf.org/publications/2005/11/national-consumer-health-privacysurvey-2005 Although this research took place quite a few years ago, many of the same issues still linger. Why is this the case? What can we do to ease real and imagined concerns? Despite implementation of HIPAA in 1996, 76% of the respondents reported that they were “somewhat” or “very concerned” about the privacy of their personal health information. Interestingly, more people (68%) believe paper records are more secure than electronic health records.1 This remains true today, with people increasingly concerned that their privacy will be violated if health information is available online or digitally. However, in reality, paper-based records are actually less secure than properly monitored digital health data. For example, a few years ago, the Boston Herald reported that for six months Brigham and Women’s Hospital had been faxing patient information sheets (including social security numbers and the results of test for sexually transmitted diseases) to a local bank.2 There have also been cases in which paper records were dumped in trash bins without being shredded. Anyone could have taken the materials out of those bins. Electronic breaches do occur, however. Seven years ago, for example, the Indianapolis Star reported that the Indianapolis Public Schools had inadvertently made available on the web private student information, including social security numbers. Because minors were involved, the Star held-off on reporting the security breaches until after the school district had been notified and given time to rectify the problem. As far as anyone could tell as time went by, these breaches did not result in any negative consequences for the students involved. More recently, Target stores – during the “Black Friday” shopping season -- lost control of millions of consumers’ credit card information. These consumers were encouraged 2 to cancel their cards and change their account passwords to keep secure information out of the hands of identity thieves. These were corporate consumer breaches; and consumer health data IS more heavily protected. Even though privacy of personal health information is a concern, most Americans know little about security of electronic medical data. We think of privacy and security as being interchangeable, but they often are not. Privacy has to do with the person – his or her rights to share health information only with specific, limited numbers of people. Security happens on the systems administration side – the computerized systems that house our data and information must be kept secure so that breaches do not occur. Electronic health records (EHRs) evolved from paper-based medical records, which were developed as a log of transactions between physicians and patients. The original purpose of the patients “chart” was to maintain a record of the care that was delivered. This paper chart has evolved into a complex EHR system that is heavily regulated. The medical record was developed by and for the care provider and was housed in the doctor’s office or the medical record department of a hospital. Such an arrangement was suitable when people maintained a relationship with one provider over a lifetime. However, with our increasingly mobile society and the proliferation of medical specialties, the traditional medical record no longer serves the needs of providing information to influence decision making. Nevertheless, the structure of most electronic health record systems remains, as Schoenberg term it, “provider-centric”. Schoenberg (Lewis, Chapter 14) provides a comprehensive overview of the technical aspects of online security. He emphasizes the systematic assessment of potential threats is fundamental to ensuring security of health information (see page 165). Meaningful Use The Office of the National Coordinator for Health Information Technology (ONC) Certification Program provides a process for ensuring that EHRs meet specific standards, criteria for hospital certification, and Centers for Medicare and Medicaid Services (CMS) goals. These standards are called MEANINGFUL USE. One of the initial goals of meaningful use was to ensure that all EHRs collected the same kinds of information. Another goal is related to information privacy and security. The goals of meaningful use are to implement the certified electronic health record (EHR) to achieve the following outcomes in healthcare: Improve quality, safety, efficiency, and reduce health disparities Engage patients and family Improve care coordination, and population and public health 3 Maintain privacy and security of patient health information Ultimately, the overall goal is to impact positively on medical outcomes: Better clinical outcomes Improved population health outcomes Increased transparency and efficiency Empowered individuals More robust research data on health systems There are incentive programs that pay hospitals and providers to adopt and implement meaningful use objectives. These incentive programs are managed by the Centers for Medicare & Medicaid Services (CSM) – called the CMS Incentive Program. Meaningful use is complicated and includes multiple stages of implementation to occur between 2011 through 2016: Stage Dates Stage 1 2011 - 2012 Goals Data capture and sharing: Stage 2 2014 Advance clinical processes: Stage 3 2016 Electronically capturing health information in a standardized format Using that information to track key clinical conditions Communicating that information for care coordination processes Initiating the reporting of clinical quality measures and public health information Using information to engage patients and their families in their care More rigorous health information exchange (HIE) Increased requirements for e-prescribing and incorporating lab results Electronic transmission of patient care summaries across multiple settings More patient-controlled data Improved patient outcomes: 4 Improving quality, safety, and efficiency, leading to improved health outcomes Decision support for national high-priority conditions Patient access to self-management tools Access to comprehensive patient data through patient-centered HIE Improving population health From HealthIT.gov: http://www.healthit.gov/providers-professionals/how-attain-meaningful-use References and Additional Resources 1 Bishop, L., Holmes, B.J., & Kelly, C.M. National consumer health privacy survey. Available at: http://www.chcf.org/documents/ihealth/ConsumerPrivacy2005ExecSum.pdf 2 Appold, K. Hospital mistakenly faxes patient record to bank. Advance for Health Information Professionals. Available at: http://healthinformation.advanceweb.com/common/Editorial/editorial.aspx?CC=67803 EHR Meaningful Use Specification Sheets for eligible professionals (EPs): https://www.cms.gov/Regulations-andGuidance/Legislation/EHRIncentivePrograms/downloads/EP-MU-TOC.pdf Meaningful use specifications for eligible hospitals https://www.cms.gov/Regulations-andGuidance/Legislation/EHRIncentivePrograms/downloads/Hosp_CAH_MU-TOC.pdf In this week’s activities, you’ll read more about meaningful use and security and privacy. Week 12 Readings Lewis, Chapter 14 Andrews, Thief vs. Patient... Advances and current state of the security and privacy in electronic health records survey from a social perspective. Tejero A. de la Torre I. Journal of Medical Systems. 36(5):3019-27, 2012 Oct. e-Health promises and challenges: some ethical considerations. Kluge EH. Studies in Health Technology & Informatics. 164:148-53, 2011. Integrating telehealth and the EHR. Organizations make progress remotely linking physicians and patients, but documenting the remote consult will require much integration work. Prestigiacomo J. Healthcare Informatics. 29(6):60, 62-3, 2012 JunJul. 5 mHealth data security: the need for HIPAA-compliant standardization. Luxton DD. Kayl RA. Mishkind MC. Telemedicine Journal & E-Health. 18(4):284-8, 2012 May. Week 12 Independent Learning Activities A. Read the ONC “Guide to Privacy and Security of Health Information” http://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide-chapter2.pdf As you read, think about how these issues impact on consumer health… Week 12 Forum Discussion This week, your discussion forum activities are limited to the following case study analysis. Please read the brief case below and discuss it with classmates. You may want to (but don’t have to) begin with the questions that appear at the end of the case. CASE STUDY: Medical Records: A Real Life Patient’s Perspective “This is a real patient's story. This one begins in an office: Patient Andrew goes to the washroom, and discovers blood in the basin after a bowel movement. Patient Andrew goes to see colleague Bill, who happens to be a nurse, explains the problem and seeks advice. Whilst Bill is reassuring Andrew, Andrew loses consciousness. Fortunately Bill is a big guy who is able to lower Andrew to the floor. Andrew is unconscious for five minutes and comes around to hear colleague Bill on the phone to call an ambulance with some urgency. First aid support arrives followed in a short time by paramedics. The paramedics get a drip in and ask questions to check the patient's status. By now there is blood on the carpet. Andrew is placed in a chair because the paramedics can't get a stretcher up to the second floor where he has collapsed. Andrew is removed to hospital by ambulance where access to the emergency room is delayed due to a fire alarm. Once inside, Andrew is examined by a nurse and then by a doctor. Blood samples are taken. Andrew is placed on a saline drip to replace lost fluids. A medical history is taken from the patient including details of current medications and allergies. From here, after 40 minutes in the emergency department, Andrew is removed to an assessment ward. On the way, the emergency room nurse tells Andrew that he is “nil by mouth”. He has no idea what this means. On arrival, there is no bed for Andrew, who waits an hour to be assigned to a bed. Once placed in a bed, Andrew is re-examined, and another medical history is taken from the patient including details of current medications and allergies. The blood tests have been 6 sent to the lab, but unfortunately, the computer which makes them available across the hospital is not working correctly and these lab results cannot be accessed. The conclusion is that overnight observation is required, and Andrew is moved to a regular ward. Once in the ward, Andrew is asked if they want to order some meals for tomorrow, but his reply is that he doesn't know if it's allowed. The menu is brought and removed twice during the evening. At lights out, Andrew is offered a hot drink and again questions its wisdom but the staff member is able to check and reassure Andrew that this is OK. Next morning, Andrew is relieved that all bleeding has stopped and that he feels relatively well with no pain. Andrew is visited by the doctor who takes another medical history before deciding that an internal camera examination is required and Andrew is discharged awaiting an outpatient appointment to have an internal camera investigation. Five days later, at a follow up visit in primary care, discharge details have not reached the primary care physician, so she has no idea what to do with Andrew.” _______________________________________________ Discuss the case with classmates this week, talking about key issues and themes. You can begin with these or any framing questions that strike you as interesting and relevant: What kinds of information and IT issues are highlighted in Andrew’s journey? Although Andrew’s medical history is always available with his primary care physician, others cannot access it from the hospital or ambulance. Incorrect or incomplete information from a confused patient could lead to an adverse event. What kinds of IT solutions can be applied to this issue? What are the most significant pros and cons of the electronic medical record? Should patients manage their own healthcare more directly? Why or why not? How can IT applications help? Debate the pros and cons of provider-centric versus consumer-centric information systems. Explore the current debate over and trends toward the implementation of the personal health record. Differentiate between privacy, confidentiality, and security in the context of CHI and this case study. Discuss the principles of information security to consumer health informatics applications. 7 Discuss the principles of information security within the context of the personal health record. 8