Patient Registration with Distributed Attributes: Difference between revisions
Jump to navigation
Jump to search
(→Actors) |
|||
Line 24: | Line 24: | ||
*This use case assumes that it will not be possible to have a single aggregation of all of a patient's digital records in a single provider. While such aggregation may be possible in smaller countries, it will never be possible in the federal system where the individual states have responsibility for the health of their residents, like the US or the EU. So the use cases is based on a fragmented source of patient data. | *This use case assumes that it will not be possible to have a single aggregation of all of a patient's digital records in a single provider. While such aggregation may be possible in smaller countries, it will never be possible in the federal system where the individual states have responsibility for the health of their residents, like the US or the EU. So the use cases is based on a fragmented source of patient data. | ||
*As a general rule, a single unified source of data is also a single point of failure that is not responsive to patient concerns. It is considered to be both more resilient and more responsive to provide an ecosystem where patient attributes are distributed among parties that are responsible for the validity and integrity of the attributes. | *As a general rule, a single unified source of data is also a single point of failure that is not responsive to patient concerns. It is considered to be both more resilient and more responsive to provide an ecosystem where patient attributes are distributed among parties that are responsible for the validity and integrity of the attributes. | ||
*In this context patient attributes are considered to be personal and financial attributes as well as medical records. | |||
==Preconditions== | ==Preconditions== |
Revision as of 15:31, 29 April 2019
Full Title of Use Case
Patient at private care provider (PCP) on-boarding ceremony to create initial EHR.
Context
- To provide good assurance that a patient data records are as accurate as possible and relate to a real live person.
Goal
- The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records.
- Provide apis as described in the Health Care Profile.
- Trusted Identifiers for all providers with clear terms of service.
- Consent experience that gives the patient rightful ownership of their data and where it is shared.y
- Collection of Attributes that can be validated by a health care provider to validate the patient.
- This may be extended in the future to patient provided medical record locators for EHR data.
Actors
- Patient (aka the subject of the EHR - can also act as a user of computer services)
- Provider of patient's general health care (the private care provider - PCP)
- Digital Identifier or Attribute providers acting the some of the following roles:
- Risk assessment evaluation.
- UHIN
- Identity Authentication Provider
Distributed Attributes
- This use case assumes that it will not be possible to have a single aggregation of all of a patient's digital records in a single provider. While such aggregation may be possible in smaller countries, it will never be possible in the federal system where the individual states have responsibility for the health of their residents, like the US or the EU. So the use cases is based on a fragmented source of patient data.
- As a general rule, a single unified source of data is also a single point of failure that is not responsive to patient concerns. It is considered to be both more resilient and more responsive to provide an ecosystem where patient attributes are distributed among parties that are responsible for the validity and integrity of the attributes.
- In this context patient attributes are considered to be personal and financial attributes as well as medical records.
Preconditions
- The patient has self-selected to become "known to the practice" where general health care is provided.
- A trust registry of providers exists (based on TEFCA) which the patient knows and trusts.
- The private care provider (PCP) presents the patient with a Entity Statement which confirms that they subscribe to the privacy regulations of TEFCA and other appropriate regulations.
- The PCP give the patient a list of documents to bring with them 30 minutes before the first appointment with the provider; for example:
- Health Insurance card
- Driver's licence
- Payment card to be used for co-pays or other changes which may occur. (Cash may be possible, but is not considered here.)
- Other providers will have created an EHR with its own Medical Records Identifier that the patient could potentially bring with them to gather existed EHR rather than rely on their own memory of their health history.
- Patient can always get their own data, but only after strong authentication. This data will include a list of existing consent grants. The patient always has the right to revoke consent
- The patient has the right to eliminate some individuals in a practice from seeing their data even when the practice has access.
Optional Conditions
- The patient has one or more trusted identifiers in cyberspace that can be used to access their health records at any of their care providers.
- The patient has access to Health IT Record Location Service (Data Aggregation) and brought a locator ID with them.
Scenarios
The goal of this scenario is to test the functionality of the APIs associated with patient trust of the providers and patient consent granting and recording.
Primary Scenario:
- Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.)
- As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an Attribute Vector, which is combined with a risk profile of the PCP to create a trust vector which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met:
- The real world individual is identified,
- The real world health history is sufficient,
- Payment has been adequately arraigned.
- Patient sees the doctor, is reauthenticated (this reauth will be less onerous than that at the front desk) and explains symptoms.
- The provider and others at the practice continue to collect patient health information and add it the the PCP EHR.
- The provider may create diagnoses, health care plans, prescriptions or refer the patient to other providers during the visit.
Alternate Scenario:
- The patient can sign onto the various practices' web sites and preform the actions from the comfort of her living room. In this case electronic consents are appropriate.
- In this case the consent receipts will be renderable to the user in plain language that they can understand.
Results
Accepted Risks:
- Data transfers involved work within a framework of trust and mutual understand as to the patient's wishes with respect to care and privacy.
Post Condition:
- The patient is given:
- Consent receipt for access that they have granted to others.
- Care plan including POLST and similar declarations that the patient has made to the practice.
- Access to their EHR (with sufficiently strong authentication.)
- The EHR includes followup contact (phone, email, etc) information to inform the patient of care plan milestones that the patient has agreed to accomplish.
- This notification capability can be used for other information that needs to be communicated to the patient after the visit.
Examples:
- tbd
Dependencies::
- Web Sites must be trusted before any user information is released.
- Trust federations can be used to help users make informed decisions.
- User consent and trust must begin with no user information transferred.
- Standards exist to collect needed attributes where-ever they may be.
Workflow Diagram
TK