This page is part of the FHIR Specification (v4.3.0: R4B - STU). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5R4BR4R3
This specification defines data elements, resources, formats, methods and APIs for
exchanging healthcare data between different participants in the healthcare process.
As such, Clinical Safety is a key concern with regard to the specification and its
many and various implementations.
Trial-Use Note:
This page, and the concept of safety in an API specification, needs further development.
FHIR is as simple to implement as we know how to make it. However, due to the nature of
healthcare, and healthcare processes, and cultural concerns, there are a number of features in
FHIR that implementers are obliged to consider in order to implement safe systems.
This section is a check list to help implementers be sure that they've considered all the parts
of FHIR that impact on their system design with regard to safety. Note that for this list,
safety is interpreted loosely, and the list covers security and privacy issues as well.
7.10.2 Conformance Related Safety Checks
These basic safety checks relate to using the FHIR specification correctly.
For each resource that my system handles, my system handles the full Life cycle (status codes, currency issues, and erroneous entry status)
For each resource that my system handles, I've reviewed the Modifier elements
I've reviewed the Observation resource, and understand how focus is a mechanism for observations to be about someone or something other than the patient or subject of record.
7.10.3 Date / Timezone Related Safety Checks
Dates and timezone issues are well-known sources of confusion and safety issues in clinical applications.
My system checks for time zones and adjusts times appropriately. (note: time zones are extremely difficult to get correct - see W3C Timezone Advice , and note that some fields should be timezone corrected, and others should not be)
My system renders dates safely for changes in culture and language (the date formats D-M-Y and M-D-Y are not differentiated for many dates, and this is a well-known source of confusion. Systems should use the month name, or otherwise be specific for each date when rendering, unless
there is solid confidence that such confusion cannot arise, even in the future when information/narrative from resources will be shared much more widely)
7.10.4 Search Related Safety Checks
These basic safety checks relate to managing the search process correctly. Mismatches in expectations between
client and server (or search requester and search processor) can result in finding more resources than expected or
appropriate, or much more seriously, missing resources out in search results that were expected to be present.
My system takes care to ensure that clients can (for servers) or will (for clients) find the information they need when content that might reasonably be exposed using more than one FHIR resource. Possible patterns: Support a single search across the applicable resources, or expose data through each applicable resource. See discussion on Wiki Page for further information
For clients
My system will display warnings returned by the server to the user
My system checks whether the server processed all the requested search parameter, and is safe if servers ignore parameters (typically, either filters locally or warns the user)
My system includes appropriate default filters when searching based on patient context - e.g. filtering out entered-in-error records, filtering to only include active, living patients if appropriate, and clearly documents these
(preferably including them in the self link for a search
7.10.5 Deletion Safety Checks
Deleting records and/or marking records as no longer valid is a well known
source of safety issues in all applications. This specification allows for
resources to be deleted, but does not require systems to behave in any
particular fashion.
For each resource, I have checked whether resources can be deleted, and/or how records are marked as incorrect/no longer relevant
Deletion of records (or equivalent updates in status) flow through the system so any replicated copies are deleted/updated
(If a server) my documentation about deleted resources is clear, and my test sandbox (if exists) has deleted/error record cases in the test data
7.10.6 Privacy Related Safety Checks
FHIR defines a set of capabilities to support data exchange. Not all the capabilities that FHIR enables may be appropriate or
legal for use in some combinations of context and jurisdiction (e.g. HIPAA for exchange between institutions). It is the
responsibility of implementers to ensure that relevant regulations and other requirements are met.
My system checks that the right Patient consent has been granted (where applicable)
My system sends an Accounting of Disclosure to the consenter as requested when permitted actions on resources are performed using an AuditEvent Resource
7.10.7 Security Related Safety Checks
Basic Context:
My system ensures that system clocks are synchronized using a protocol like NTP or SNTP, or my server is robust against clients that have the wrong clock set
My system uses security methods for an API to authenticate where Domain Name System (DNS) responses are coming from and ensure that they are valid
Communications:
Production exchange of patient or other sensitive data will always use some form of encryption on the wire
Where resources are exchanged using HTTP, TLS should be utilized to protect the communications channel
Where resources are exchanged using email, S/MIME should be used to protect the end-to-end communication
My system uses OpenID Connect (or other suitable authentication protocol) to verify identity of end user, where it is necessary that end-users be identified to the client application, and has a clear policy on identity proofing
Access Control:
My system applies appropriate access control to every request, using a combination of requester’s clearance (ABAC) and/or roles (RBAC)
My system considers security labels on the affected resources when making access control decisions
My system validates all input received (whether in resource format or other) from other actors so that it data is well-formed and does not contain content that would cause unwanted system behavior
Obviously, this list is only a small part of the overall safety check list for an application, which will have checks regarding jurisdictionally mandated policies, internal integrity, etc.
In addition, server developers should check these specific additional checks for client convenience:
Server: CORS (cross-origin resource sharing ) is appropriately enabled (many clients are Javascript apps running in a browser)
JSON is supported (many clients are Javascript apps running in a browser; XML is inconvenient at best)
JSON is returned correctly when errors happen (clients often don't handle HTML errors well)
The _format header is supported correctly
Errors are trapped and an OperationOutcome returned