Patient with Lab and Referral Use Case: Difference between revisions
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
===Goal=== | ===Goal=== | ||
The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records. | * The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records. | ||
* Provide the two apis as described in the [[Health Care Profile]]. | |||
# Trusted Identifiers for all providers, and perhaps patients as well. | |||
# Consent experience for patient | |||
===Actors=== | ===Actors=== |
Revision as of 20:19, 4 February 2019
Full Title of Use Case
Patient at private care provider is given a lab test which results to a referral to a different practice.
Context
To provide good assurance that a patient data is kept as private as possible consistent with quality health care.
Goal
- The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records.
- Provide the two apis as described in the Health Care Profile.
- Trusted Identifiers for all providers, and perhaps patients as well.
- Consent experience for patient
Actors
- Patient
- Provider of patient's general health care
- Lab to perform test on patient sample
- Provider of specialized services related to patient diagnosis
Preconditions
- The patient is "known to the practice" where general health care is provided.
- A trust registry exists which the patient knows and trusts.
- The providers of health care and lab services present the patient with a trusted identity which confirms that they subscribe to the privacy regulations of the trust provider.
- Different providers are unlikely to allow each other, or the patient, to write into their EHR, so it is expected that the patient will have multiple repositories, each with their own Medical Records Identifier.
An optional condition would be for the patient to have a trusted identity in cyberspace that can be used to access their health records at any of their care providers.
Scenarios
Primary Scenario:
- Patient schedules an appointment with primary care physician and is authenticated at the front desk.
- Patient sees the doctor, is reauthenticated and explains symptoms.
- Doctor schedules a lab test for a sensitive condition
- The patient is given a consent receipt that tells the patient the labs trusted identity and adherence with the trust registry conditions for handling patient records.
- The patient positively gives consent consonant with the receipt by signing a copy and returning to the doctors practice.
- The patient goes to the lab which gives a trusted identifier to the patient.
- The patient is authenticated and given the test.
- The lab has consent and so passes the patient data to the doctor's practice.
- The doctor asks for patient consent to schedule further diagnostics with a doctor in a different practice.
- The patient can evaluate that other practice with respect to competence and compliance with appropriate privacy practices.
- The patient gives consent, schedules a consultation and the lab results are passed to the other practice.
- The patient receives a consent receipt from the primary doctor as to the transfer of health records to that other practice
Alternate Scenario:
- The patient can sign onto the various practices' web sites and preform the actions from the comfort of her living room.
Results
Accepted Risks:
- Data transfers involved work within a framework of trust and mutual understand as to the patient's wishes with respect to care and privacy.
Post Condition:
- The patient results are available it is assumed that the consent receipt acknowledged that the data would be sent back to the primary care doctor.
Examples:
- tbd
Dependencies::
- Web Sites must be trusted before any user information is released.
- Trust federations can be used to help users make informed decisions.
- User consent and trust must begin with no user information transferred.
- Standards exist to collect needed attributes where-ever they may be.
Workflow Diagram
TK