The following content is intended to apply to all Da Vinci IGs. IGs derived from HRex SHOULD all reference this section, though they may qualify and supplement the content here as appropriate for the specific technologies they are using, and the threat environment and privacy considerations involved in their specific use case.
Statutes, Regulations, and Guiding Principles
- All implementations of any Da Vinci FHIR Implementation Guides (IG) SHALL meet all current relevant Federal and State statutes and regulations regarding security and privacy.
- All IGs SHALL use applicable technical standards required by current regulations published by CMS and ONC (allowing for voluntary use through the SVAP) unless an exception has been granted.
- All IGs and implementations SHOULD follow the current Da Vinci Guiding Principles.
- All IGs and implementations SHALL support patient/member consent and/or treatment of sensitive information consistent with Federal and State statutes and regulations.
- All IGs and implementations SHOULD support the consent and data sharing policies of trading partners involved in the exchange that are more protective so long as policies are consistent with or more restrictive than Federal and State statutes and regulations.
FHIR Security and Implementation Guidance
All FHIR Implementation Guides SHOULD follow the FHIR Security guidance and FHIR Implementer’s Safety guidance as defined in the relevant FHIR specification (e.g. Release 4.1.0) where applicable and not superseded by this Section or specific IG requirements.
- The FHIR Security specification provides guidance related to communication security, authentication, authorization/access control, audit, digital signatures, attachments, labels, narrative, and input validation. The FHIR security specification is available here.
- The FHIR Implementer’s Safety specification is a check list to help implementers be sure that they have considered all the parts of FHIR that impact their system design regarding safety. The FHIR safety check list is available here.
Security/Privacy Related Technologies Including Explicit Consent and Security Labels
- As of May 2020, ONC has elected to not require either Data Labeling or Consent Directives as part of the Final Rule for the 21st Century Cures Act.
- At present there is no explicit regulatory requirement for the use of these technologies in Da Vinci specifications.
- However, to meet the statutes, regulations, and guiding principles above, consent directives and security labels MAY be considered and used.
- Organizations which plan to take advantage of these additional capabilities are responsible for negotiating support for these mechanisms between trading partners. The FHIR implementation guide defining the recommended standard is the FHIR Data Segmentation for Privacy IG.
Exchange Security
- When exchanging PHI between entities, the exchange SHOULD use the current version and SHALL use either current or the immediately prior release of Transport Level Security (TLS) as specified by the current release of NIST guidelines (SP 800-52).
- When the identity of the requesting or receiving party is important, implementations SHOULD use one or more of the following as defined in the specific Da Vinci IG:
- the SMART on FHIR Framework ,
- mutually authenticated TLS ,
- the ONC FHIR At Scale Taskforce (FAST) security tiger team recommended solutions, or
- the OAuth Server to Server Authentication as defined in the Bulk Data exchange IG.
Note: There is ongoing work to enhance the capabilities of the above specifications to ensure a more secure exchange that recognizes issues related to fine grain scopes.
Additionally Protected Information
Additionally protected information may include items defined by Federal (e.g. 42 CFR Part 2), State (e.g. many states protect substance abuse disorder, HIV diagnosis/treatment records, release of information on minors – note this is not an exhaustive list) statutes and regulations. In addition, organizations may provide for additional protection for specific types of information that are deemed sensitive to the individual (e.g. elective abortion). The following guidelines apply unless otherwise dictated by statute or regulation:
- Where permitted by law and in accordance with legal requirements, release of additionally protected information SHALL always be supported.
- Release of the information without explicit request of the patient/member SHALL be based on organization policy consistent with Federal and State regulations. Examples are legal request for information and “break glass” to treat a patient that is unable to provide consent.
Security Contexts for Da Vinci IGs
Da Vinci IGs span several security contexts related to the exchange of information between requester and supplier of data. These security contexts include:
Exchange without PHI
- Access to openly available data (e.g. Payer’s provider directory)
- No identity, access, authentication, or audit requirements
- Access restrictions are only imposed to protect the site or manage the ability of the site to handle valid requests (e.g. protection against Denial of Service attacks)
- Access to Sensitive Business Information (e.g. open schedule slots for a provider, blinded and aggregated patient data)
- Identity, access, authentication, and/or audit requirements are up to the Information Supplier
- Requirements should be consistent with current best practice for such information (if access includes exchange of PHI see the following section)
- Exchange of a token or internal key
- Secure exchange between trusted entities
- Access rights are inherent in the token
- Internal key does not necessarily imply access rights
- Requirements should be consistent with current best practice for such information (if access includes exchange of any unencrypted PHI see the following section)
Exchange of PHI for TPO (as defined by HIPAA)
This includes exchange of PHI between:
- two covered entities,
- a covered entity with a third party (e.g. for quality reporting), or
- a covered entity and the member/patient.
In all cases, the Information Supplier (in accordance with HIPAA security and privacy rules):
- SHALL log all IDs, access rights, requests, and exchanges.
- SHALL verify rights of the requestor to have access to the member’s/patient’s record.
Requesting Information |
Information Supplier |
Covered by HIPAA under (see regulations for details) |
Automated Declaration of Purpose of Use on Request |
Patient/Member |
Covered Entity |
Right of Access |
N/A |
Provider |
Provider |
TPO |
(need process) |
Provider |
Payer |
TPO |
(need process) |
Payer |
Payer/Provider |
PO including Coordination of Care |
(need process) |
Other (e.g. CMS/NCQA) |
Provider/Payer |
PO (member authorization where required) |
(need process) |
Note: (need process) – there is no current mechanism (outside of CommunicationRequest) to declare a purpose of use when accessing data using RESTful mechanisms (e.g. GET) – the standards for the need to be addressed within HL7.
Exchange via Business Associates (BA) – for a Covered Entity
- Both Covered Entity and BA are defined and scoped by HIPAA
- Requires a HIPAA compliant Business Associate Agreement (BAA)
- BA inherits all the requirements and responsibilities of the covered entity that are not reserved by the covered entity (e.g. disclosure reporting)