Difference between revisions of "April 25, 2017 Security Conference Call"
Line 79: | Line 79: | ||
==Example of sites discussing CTF4FA== | ==Example of sites discussing CTF4FA== | ||
*[https://www.cdt.org/files/healthprivacy/20080514HPframe.pdf Center for Democracy and Technology: Comprehensive Privacy and Security: Critical for Health Information Technology] | *[https://www.cdt.org/files/healthprivacy/20080514HPframe.pdf Center for Democracy and Technology: Comprehensive Privacy and Security: Critical for Health Information Technology] | ||
− | *[www.slideshare.net/iirojan/thews-trusted-ehealth-and-ewelfare-space THEWS - Trusted eHealth and eWelfare Space – SlideShare www.slideshare.net/iirojan/thews-trusted-ehealth-and-ewelfare-space] | + | *[https://www.slideshare.net/iirojan/thews-trusted-ehealth-and-ewelfare-space THEWS - Trusted eHealth and eWelfare Space – SlideShare www.slideshare.net/iirojan/thews-trusted-ehealth-and-ewelfare-space] |
*[https://www.jmir.org/2012/2/e52 JMIR-A Conceptual Framework and Principles for Trusted eHealth and eWelfare Space] | *[https://www.jmir.org/2012/2/e52 JMIR-A Conceptual Framework and Principles for Trusted eHealth and eWelfare Space] | ||
=='''Minutes'''== | =='''Minutes'''== |
Revision as of 23:21, 24 April 2017
Contents
Attendees
x | Member Name | x | Member Name | x | Member Name | x | Member Name | |||
---|---|---|---|---|---|---|---|---|---|---|
. | John MoehrkeSecurity Co-chair | x | Kathleen ConnorSecurity Co-chair | . | Alexander Mense Security Co-chair | . | Trish WilliamsSecurity Co-chair | |||
x | Mike Davis | x | Suzanne Gonzales-Webb | x | David Staggs | x | Mohammed Jafari | |||
x | Glen Marshall, SRS | x | Beth Pumo | . | Ioana Singureanu | . | Rob Horn | |||
x | Diana Proud-Madruga | . | Serafina Versaggi | x | Joe Lamy | . | Galen Mulrooney | |||
. | Duane DeCouteau | . | Chris Clark | . | Johnathan Coleman | . | Aaron Seib | |||
. | Ken Salyards | . | Christopher D Brown TX | . | Gary Dickinson | x | Dave Silver | |||
x | Rick Grow | . | William Kinsley | . | Paul Knapp | x | Mayada Abdulmannan | |||
. | Kamalini Vaidya | . | Bill Kleinebecker | x | Christopher Shawn | . | Grahame Grieve | |||
. | Oliver Lawless | . | Ken Rubin | . | David Tao | . | Nathan Botts |
Agenda
- (2 min) Roll Call, Agenda Approval
- (4 min) Review and Approval of Security WG Call Minutes April 18, 2017
- (5 min) TF4FA May ballot results to date - Kathleen - please vote!
- (20 min) What does the WG want to achieve in Madrid - Attending cochairs: Opportunity to review the May WG Agenda_and discuss key objectives that the WG representative should try to achieve.
- (20 min) Brainstorming on what a Healthcare Consumer Trust Framework for Federated Authorization [CTF4FA] would encompass. This topic was initiated on the April 18th call. The conversation needs to continue to gain insights on what the community would expect a CTF4FA to look like. See summary below.
- (5 min) FHIR Security Call - Please review front matter - John Moehrke
Consumer Oriented TF4FA
Current Trust Frameworks are static; once established, these are very hard to change. Static Trust Frameworks are typically oriented to those who control information and value flows. Consumers seem to have little or no voice in these Trust Framework Trust Policy, or the resulting Trust Recipient or Trust Relying Party Agreements.
Should the HL7 TF4FA be more encompassing of healthcare consumers as parties in the negotiation of Trust Frameworks for Federated Authorization with counterparties with which they can share health information on terms that consumers find more attractive in some way - e.g., for more control of their information's privacy and security, or even for compensation for use of their health information?
Enabling healthcare consumers to negotiate more equitable trust framework will require changing the balance of power where custodians "own" the consumer's health information. Patient Right of Access is disrupting that paradigm. It may be that providers and EHR vendors will see an advantage in supporting PRA as a means to off-load breach liability and consent management, and by simply duplicating patient information in a server accessible to patients for view, download, and transmit, they are able to avoid EHR security issues, although they still have responsibility for the security of a PRA store.
At the same time as custodians are seeing advantages, so are secondary users of patient information. PRA is attractive in that it reduces friction resulting from meeting data sharing requirements of custodians. At this juncture however, these secondary users seem somewhat inclined to negotiate with the consumers that are now supplying them with patient information.
As this new mode of sharing health information scales, healthcare consumers' market place clout to demand more control will increase. With user friendly trust negotiation technologies, we can imagine many healthcare consumers with 0..* trust domains, and 0..* privacy preferences, and security and trust risk tolerances having more and more health information consumers with which to bargain for their best trust contract deal.
HL7 TF4FA could serve as the conceptual model for the healthcare consumer trust negotiation technologies needed to enable this emerging market.
Example of sites discussing CTF4FA
- Center for Democracy and Technology: Comprehensive Privacy and Security: Critical for Health Information Technology
- THEWS - Trusted eHealth and eWelfare Space – SlideShare www.slideshare.net/iirojan/thews-trusted-ehealth-and-ewelfare-space
- JMIR-A Conceptual Framework and Principles for Trusted eHealth and eWelfare Space