Permissions Catalog: Recommendations for Reuse
Reusing the HL7 RBAC Permission Catalog Terminology
for Composite Privacy Consent Directive
The current Permissions Catalog for Role-Based Access Control (RBAC) specifies a set of normative permissions that may grouped into functional roles for use in healthcare. The Security WG (jointly with CBCC) is currently working on a project intended to provide controlled terminology for the operations and objects referenced in the RBAC Permission Catalog (see TSC project list - item 118).
The permission catalog ad-hoc operation and object names is a normative specification and it is available for download.
- The most recently published permission catalog is 20071112_HL7_RBAC_Healthcare_Permission_Catalog_v3_37.pdf
The Community-based Collaborative Care (CBCC) work group is responsible for the maintenance and enhancement of the Data Consent standard (Release 1 approved in 2007). The Data Consent standard was enhanced and the update will continue through May 2009 (see Composite Privacy Directive Release 1, Draft for Comment).
The RBAC operations extend the typical database C(reate),R(ead),U(update),D(elete) operations and they refer specifically to the ability of healthcare users to:
- delete, and
- execute (?) "[...]results only in initiating performance of a single or set of programs."
specific healthcare "objects" identified in the RBAC Permission Catalog. The RBAC "objects" refer to a variety of healthcare information elements (e.g. Progress Notes, Summary Report) and functions (e.g. ADT). A permission specifies an operation and the object on it it is applied :
Administrative Ad Hoc Report
A role that has this permission, allows the user that logs in with that role to create a new ad-hoc administrative report for any patient and read the contents of any administrative ad-hoc reports for any patient.
A role that has this permission, allows the user that logs in with that role to review progress notes for any patient.
HL7 Operations rather RBAC-only Operations
In order to reuse the RBAC operations for both RBAC and Composite Privacy Consent Directive (and perhaps other standards in the future), it would be preferable if the RBAC operations could be based on the HL7 trigger events specified in the HL7 RIM reference documentation and the #HL7 RIM References included in this document. The healthcare work flow as specified in HL7, provides for "trigger events" that correspond to healthcare-specific operations. The following table is an example mapping of the HL7 trigger events to RBAC operations. As seen here, the HL7 triggers/operations are more closely related to the healthcare delivery workflow and thus they will promote the reuse of HL7 permissions.
|HL7 Operations (trigger event)||RBAC Operations||Data Consent Operation|
Extensions to HL7 trigger events
The following operations are not currently specified in the HL7TriggerEventCodes and do not affect the state of a healthcare object but they are important to RBAC and Data Consent:
|RBAC Operations||Data Consent Operation|
The following diagram shows the trigger events and the states that correspond to the healthcare work flow for healthcare object (e.g. Act). For example, an order may be created, activated, then canceled. Similarly an order may be created, activate, revised, and eventually completed.
Value Sets for "Object"
Currently, the Security work group is attempting to map the "objects" specified in the Permissions Catalog to SNOMED CT codes. However, several "objects" in the permission catalog are actually document types that have been codified for use with the CDA R2 standard. Additionally, sections of the CDA documents have been standardized by HL7. Since CDA R2 clinical documents are often used to exchange patient records between organizations, the ability to refer to specific types of documents or sections of a document may be useful both for RBAC and consent directive specifications.
HL7 Concept Domains and HL7 Coding Systems
The availability of HL7 concept domains and coding systems allows the reuse of RBAC object terminology by other standards such as Composite Privacy Consent Directive (aka Data Consent ).