Patient Registration with Distributed Attributes: Difference between revisions
Jump to navigation
Jump to search
Line 38: | Line 38: | ||
Primary Scenario: | Primary Scenario: | ||
#Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.) | #Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.) | ||
#As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an attribute vector, which is combined with a risk profile of the PCP to create a trust vector which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met: | |||
## The real world individual is identified, | |||
## The real world health history is sufficient, | |||
## Payment has be adequately arraigned. | |||
#Patient sees the doctor, is reauthenticated (this reauth will be less onerous than that at the front desk) and explains symptoms. | #Patient sees the doctor, is reauthenticated (this reauth will be less onerous than that at the front desk) and explains symptoms. | ||
# | #The provider and others at the practice continue to collect patient health information and add it the the PCP EHR. | ||
#The provider may create diagnoses, health care plans, prescriptions or refer the patient to other providers during the visit. | |||
Revision as of 20:49, 27 April 2019
Full Title of Use Case
Patient at private care provider (PCP) on-boarding ceremony to create initial EHR.
Context
- To provide good assurance that a patient data records are as accurate as possible and relate to a real live person.
Goal
- The patient in the very near future has full capability to exercise their right to participate in the care plan and see who has access to their medical records.
- Provide the two apis as described in the Health Care Profile.
- Trusted Identifiers for all providers, and perhaps patients as well.
- Consent experience that gives the patient rightful ownership of their data and where it is shared.
Actors
- Patient
- Provider of patient's general health care
Preconditions
- The patient has self-selected to become "known to the practice" where general health care is provided.
- A trust registry of providers exists (based on TEFCA) which the patient knows and trusts.
- The private care provider (PCP) presents the patient with a trusted identity which confirms that they subscribe to the privacy regulations of TEFCA.
- The PCP give the patient a list of documents to bring with them 30 minutes before the first appointment with the provider; for example:
- Health Insurance card
- Driver's licence
- Payment card to be used for co-pays or other changes which may occur. (Cash may be possible, but is not considered here.)
- Other providers will have created an EHR with its own Medical Records Identifier that the patient could potentially bring with them to gather existed EHR rather than rely on their own memory of their health history.
- Once on-site at the PCP, the patient will be given the standard release of information forms to grant access for others to their EHR.
- Patient can always get their own data, but only after strong authentication. This data will include a list of existing consent grants. The patient always has the right to revoke consent
- The patient has the right to eliminate some individuals in a practice from seeing their data even when the practice has access.
Optional Conditions
- The patient has a trusted identity in cyberspace that can be used to access their health records at any of their care providers.
- The patient has access to Health IT Record Location Service (Data Aggregation) and brought a locator ID with them.
Scenarios
The goal of this scenario is to test the functionality of the APIs associated with patient trust of the providers and patient consent granting and recording.
Primary Scenario:
- Patient schedules an appointment with primary care physician and is authenticated at the front desk. (This will typically include a request to grant access held in the EHR at the practice to others - aka a consent form.)
- As the receptionist collects patient data, an EHR is built up. Before the patient is permitted to see the provider the patient identifiers and attributes are built up into an attribute vector, which is combined with a risk profile of the PCP to create a trust vector which is scored by the computer. If the patient does not have sufficient trust score, the computer will direct the receptionist to continue to collect data until the following conditions (inter alia) are met:
- The real world individual is identified,
- The real world health history is sufficient,
- Payment has be adequately arraigned.
- Patient sees the doctor, is reauthenticated (this reauth will be less onerous than that at the front desk) and explains symptoms.
- The provider and others at the practice continue to collect patient health information and add it the the PCP EHR.
- The provider may create diagnoses, health care plans, prescriptions or refer the patient to other providers during the visit.
Alternate Scenario:
- The patient can sign onto the various practices' web sites and preform the actions from the comfort of her living room. In this case electronic consents are appropriate.
- In this case the consent receipts will be renderable to the user in plain language that they can understand.
Results
Accepted Risks:
- Data transfers involved work within a framework of trust and mutual understand as to the patient's wishes with respect to care and privacy.
Post Condition:
- r.
Examples:
- tbd
Dependencies::
- Web Sites must be trusted before any user information is released.
- Trust federations can be used to help users make informed decisions.
- User consent and trust must begin with no user information transferred.
- Standards exist to collect needed attributes where-ever they may be.
Workflow Diagram
TK