welcome to ihe iti de identification guidance for family
play

+ Welcome to IHE ITI De-Identification Guidance for Family - PDF document

Slide 1 + Welcome to IHE ITI De-Identification Guidance for Family Planning FPAR2.0@hhs.gov Welcome to todays webinar on the de - identification guidance OPA is developing for the family planning profile in partnership with Integrating the


  1. Slide 1 + Welcome to IHE ITI De-Identification Guidance for Family Planning FPAR2.0@hhs.gov Welcome to today’s webinar on the de - identification guidance OPA is developing for the family planning profile in partnership with Integrating the Healthcare Enterprise. I’m Christina Lachance, Public Health Advisor at the Office of Population Affairs and the staffer who’s been in charge of leading the effort to revise the Family Planning Annual Report since 2012. As you may know, this work is directly connected to OPA’s efforts to revise FPAR to be interoperable with electronic health records systems. This is why privacy and security work is especially important to consider as we move this project forward. We are thrilled you could take the time to join us today. We hope this that this will give you an idea of what to expect from the committee work that we are launching and entice you to partner with us.

  2. Slide 2 Gila + Christina Johanna Lauren 2 We thought it’d be helpful for you to have a picture of who was talking to you today. Christina Lachance is the public health advisor and Health IT Team Lead for FPAR 2.0. Johanna Goderre is the Senior Health Informatics Advisor and technical lead for the Health IT Team. Lauren Corboy is an ORISE Fellow with the OPA Health IT Team. She manages the team’s social media work, and has been working in the health IT field for about 2.5 years. Gila Pyke is today’s guest star as the co - chair of the IHE ITI technical committee that is leading this effort and is a Privacy and Security consultant working in the Health IT space and helping with the FPAR 2.0 privacy and security roadmap.

  3. Slide 3 + You’re in the right place if you… 3  Are invested in helping OPA create the future of FPAR  Want to impact the Family Planning Technical Profile that will be implementable by any EHR vendor (both in and outside Title X)  Become the go-to person in your organization for knowing the nitty-gritty of FPAR 2.0  Want to be at the table to help OPA make critical decisions about data elements that might be challenging from a privacy and security perspective  Care about the privacy and security of data within your organization If any of these statements describe your reason for showing up here today, then you are in the right place! BENEFITS OF PARTICIPATION – become the go to person in your organization for FPAR 2.0, gain hands - on knowledge of the Privacy and Security roadmap and de - Identification methodology and become a champion for privacy and security. IF for some reason there is a challenge with one of these data elements, you will be at the table to help make the decision on what happens with this data in the future

  4. Slide 4 + FPAR 2.0 Privacy and Security 4 Roadmap http://opahit.sites.usa.gov/ Assess Plan Design Deploy Phases Implement Establish grantee Draft grantee Select De- Hosting System Training and reporting and privacy and security Identification configuration Awareness privacy and security governance model algorithm capacity Privacy and Security Design FPAR 2.0 Privacy and Identify target User provisioning capacity architecture based Security information improvement on Conceptual PIA communication and inventory Identify target and TRA and training strategy Other activities as Identify target planned safeguards defined by updated privacy and security Activities provider and system Delta PIA and TRA on PIA and TRA requirements per Delta PIA and TRA actors physical architecture, mitigation plans actor of FPAR 2.0 design including vulnerability Identify target data Perform Conceptual assessment (VA) flows Program Define Privacy and PIA and TRA Security obligations performance plans Identify de- for data sharing Communication and established identification agreement training strategy requirements and options Create detailed program instructions and supporting toolkit Agreement on Conceptual PIA and Updated Go-Live! First FPAR 2.0 privacy Privacy and TRA and risk configurations post- reports collected and security risk Security roadmap mitigation plan VA acceptance mitigation plan Maintenance update Privacy and Updated P+S Signed NGA and strategy approved Security questions Roadmap and Milestones Approved DSA DSA components requirements incorporated into integrated into NGA FPAR 2.0 feasibility questionnaire Privacy and Security plan reviewed by legal counsel Just a reminder that the privacy and security roadmap has been discussed in 2 blog posts and there is more information on the blog here: http://opahit.sites.usa.gov/2015/02/17/privacy - and - security - for - fpar - 2 - 0/ This lays out what we need to accomplish to ensure that all the privacy and security building blocks are in place to enable the benefits of complex data sharing among the diverse stakeholders in the FPAR 2.0 community. Privacy and Security safeguards at the administrative, technical and physical levels are all needed to reduce the risk of potential harm to our clients. We want to do everything we can to reduce the potential for the breaches or misuse of data that you hear so much about in the news nowadays. There are a lot of steps involved!

  5. Slide 5 + How this work relates to FPAR 2.0 5  The data elements in the FP Profile will satisfy the FPAR 2.0 reporting requirements and feed QFP-related performance measures  Enable us to return clinically relevant metrics back to the network  Vision: Promote the adoption of these metrics outside of Title X 70% My performance My site My network National 60% 50% 40% 30% 20% 10% 0% 2010 2014 2010 2014 2010 2014 2010 2014  Protecting client privacy is a cornerstone of the success of FPAR 2.0 This shows the long term goal of FPAR 2.0 – giving everyone back metrics that are clinically - relevant and interpretable at all levels of the Title X network. We are also working in collaboration with measure endorsement organizations, like NQF, to have some of our FPAR 2.0 measures adopted for use beyond Title X in any setting where family planning care is delivered.

  6. Slide 6 + Today’s Objectives 6 By the end of this orientation, you will be able to:  Communicate to your peers about IHE and the IHE ITI De-Identification for Family Planning effort  Participate actively in teleconference discussions to select de-identification guidance for Family Planning data  Find the resources and information you need to participate in this effort People describe first 6 months of standards work as drinking through a fire hose. The purpose of this webinar is to try to ease that a little and give you enough information to help you understand what to expect, how to participate, and where to find the info that you need or know who to ask question to. EVERYONE IS WELCOME TO PARTICIPATE!

  7. Slide 7 + What is IHE ITI 7 http://www.ihe.net  IHE International is an initiative by healthcare professionals and industry to improve the way computer systems in healthcare share information.  IHE is composed of 12 domains, responsible for the development and maintenance of IHE Technical Frameworks. Anatomic Pathology Cardiology Dental Eye Care IT Infrastructure Laboratory Patient Care Patient Care Pharmacy Coordination Devices Quality, Research Radiation Oncology Radiology and Public Health IHE promotes the coordinated use of established standards to address specific clinical needs in support of optimal patient care. Systems developed in accordance with IHE communicate with one another better, are easier to implement, and enable care providers to use information more effectively. IHE is a public collaboration – anyone can participate and lend their expertise. The domains most relevant for the work OPA is doing with the family planning profile are QRPH and ITI ITI is the committee responsible for defining INTEROPERABILITY, including how to transmit data between systems, as well as the privacy and security components of ensuring trust and safety of sensitive data

Recommend


More recommend