Patient Registration with Distributed Attributes: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 38: Line 38:
Primary Scenario:
Primary Scenario:
#Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.)
#Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.)
#As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an attribute vector, which is combined with a risk profile of the PCP to create a [https://tcwiki.azurewebsites.net/index.php?title=Trust_Vector trust vector] which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met:
#As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an [[Attribute Vector]], which is combined with a risk profile of the PCP to create a [https://tcwiki.azurewebsites.net/index.php?title=Trust_Vector trust vector] which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met:
## The real world individual is identified,
## The real world individual is identified,
## The real world health history is sufficient,
## The real world health history is sufficient,

Revision as of 21:19, 27 April 2019

Full Title of Use Case

Patient at private care provider (PCP) on-boarding ceremony to create initial EHR.

Context

  • To provide good assurance that a patient data records are as accurate as possible and relate to a real live person.

Goal

  • The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records.
  • Provide the two apis as described in the Health Care Profile.
  1. Trusted Identifiers for all providers, and perhaps patients as well.
  2. Consent experience that gives the patient rightful ownership of their data and where it is shared.

Actors

  1. Patient
  2. Provider of patient's general health care

Preconditions

  1. The patient has self-selected to become "known to the practice" where general health care is provided.
  2. A trust registry of providers exists (based on TEFCA) which the patient knows and trusts.
  3. The private care provider (PCP) presents the patient with a trusted identity which confirms that they subscribe to the privacy regulations of TEFCA.
  4. The PCP give the patient a list of documents to bring with them 30 minutes before the first appointment with the provider; for example:
    1. Health Insurance card
    2. Driver's licence
    3. Payment card to be used for co-pays or other changes which may occur. (Cash may be possible, but is not considered here.)
    4. Other providers will have created an EHR with its own Medical Records Identifier that the patient could potentially bring with them to gather existed EHR rather than rely on their own memory of their health history.
  5. Once on-site at the PCP, the patient will be given the standard release of information forms to grant access for others to their EHR.
  6. Patient can always get their own data, but only after strong authentication. This data will include a list of existing consent grants. The patient always has the right to revoke consent
  7. The patient has the right to eliminate some individuals in a practice from seeing their data even when the practice has access.

Optional Conditions

Scenarios

The goal of this scenario is to test the functionality of the APIs associated with patient trust of the providers and patient consent granting and recording.

Primary Scenario:

  1. Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.)
  2. As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an Attribute Vector, which is combined with a risk profile of the PCP to create a trust vector which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met:
    1. The real world individual is identified,
    2. The real world health history is sufficient,
    3. Payment has been adequately arraigned.
  3. Patient sees the doctor, is reauthenticated (this reauth will be less onerous than that at the front desk) and explains symptoms.
  4. The provider and others at the practice continue to collect patient health information and add it the the PCP EHR.
  5. The provider may create diagnoses, health care plans, prescriptions or refer the patient to other providers during the visit.


Alternate Scenario:

  1. The patient can sign onto the various practices' web sites and preform the actions from the comfort of her living room. In this case electronic consents are appropriate.
  2. In this case the consent receipts will be renderable to the user in plain language that they can understand.

Results

Accepted Risks:

  1. Data transfers involved work within a framework of trust and mutual understand as to the patient's wishes with respect to care and privacy.

Post Condition:

  1. The patient is given:
    1. Consent receipt for access that they have granted to others.
    2. Care plan including POLST and similar declarations that the patient has made to the practice.
    3. Access to their EHR (with sufficiently strong authentication.)
  2. The EHR includes followup information to inform the patient of care plan milestones that the patient has agreed to accomplish.
    1. This notification capability can be used for other information that needs to be communicated to the patient after the visit.

Examples:

  1. tbd

Dependencies::

  1. Web Sites must be trusted before any user information is released.
  2. Trust federations can be used to help users make informed decisions.
  3. User consent and trust must begin with no user information transferred.
  4. Standards exist to collect needed attributes where-ever they may be.

Workflow Diagram

TK


References