Basic Patient Privacy Consents
The Basic Patient Privacy Consents (BPPC) profile provides a mechanism to record the patient privacy consent(s), a method to mark documents published to XDS with the patient privacy consent that was used to authorize the publication, and a method for XDS Consumers to use to enforce the privacy consent appropriate to the use.
Basic Patient Privacy Consents profile provide mechanisms to:
- Record the patient privacy consent(s),
- Mark documents published to XDS with the patient privacy consent that was used to authorize the publication,
- Enforce the privacy consent appropriate to the use.
The BPPC profile has been moved from PCC into ITI domain. The profile is now in Trial Implementation and can be found on the IHE web site.
The current "Trial Implementation" version of this profile can be found at http://www.ihe.net/Technical_Framework/upload/IHE_ITI_TF_Supplement_BPPC_TI_2007_08_15.pdf.
A BPPC Presentation was presented at the IHE Educational Workshop on June 13, 2007, by John Moehrke and Lori Fourquet.
The deprecated first year supplement Basic Patient Privacy Consents (BPPC) profile.
An Affinity Domain can
- develop privacy policies,
- and implement them with role-based or other access control mechanisms supported by EHR systems.
A patient can
- Be made aware of an institutions privacy policies.
- Have an opportunity to selectively control access to their healthcare information.
First: The Affinity Domain organizers create a set of policies. Each of the policies are each given an OID. This OID now is an Affinity Domain specific vocabulary. Each OID can clearly identify one of the policies defined by the HIE. There are examples of how one might build these policies in a way that allows the patient to select appropriately the type of sharing they agree too. This was important as it allows the Affinity Domain to define their own policies in as clear of language as was necessary for the patients, providers, and systems to understand. This level of policy writing is necessary before one can even hope to commit the logic to computer encoding.
Second: The BPPC profile shows how to capture a patient's acknowledgment and/or signature of one or more of these policies. This is captured using HL7 consent structure within an CDA document with optionally a scanned copy or optionally a digitally signature. The scanned copy might be the patient's ink on paper acknowledgment. This capability has been very well received as providers like to see that ink was put to paper. I suspect that this step will never be replaced. Patients have a need to know what they are consenting to. They can understand human text, but not many can understand computer logic.
Third: When a clinical document is published, the OIDs defined in the First step are used to label each document with the acceptable use (permissions, restrictions, obligations). The system actually supports multiple OIDs being attached to each document, so that multiple acceptable uses can be represented (something not allowed inside a CDA document). This confidentiality code is in XDS Metadata and thus can be applied to ANY type of document, not just CDA documents. Thus if a ECG is captured in a PDF file, it can be appropriately labeled with the acceptable uses.
Fourth: When a document is used, the metadata shows the acceptable use OIDs. The document consumer Actors are obligated to enforce this acceptable use. The document consumer Actor is required to block access to documents that don't have acceptable OIDs. Any OIDs that are not understood by the document consumer Actor must not be used.
Possible things that the BPPC policies might include are not fully known at this time. The following is a list that has been discovered through use by researchers, health information exchanges, and vendors. The following are some thoughts of things that might be orchestrated by BPPC Policies.
- Is the existence (metadata) about a document that can't be read by the user shown in a list of available documents for this patient
- Map local role codes into some Affinity Domain defined role codes
Prior to publication
- one site specific code to publish documents against
- prompt user for the code to apply to the document (drop-down-list)
- document-type based codes
- validate that the code to be published against has been consented to
- validate that a site specific code (opt-out) is NOT currently consented to.
Prior to allowing access to a document
- should documents with unrecognized codes be shown?
- prompt the user with some site defined text "do you really want to do this?"
- allow the user to review the base consent policy
- allow the user to review the patient's specific consent
- allow the user to override a consent block (break-glass)
- require that a new consent be acquired first
- validate that a site specific code (opt-out) is NOT currently consented to.
- validate that the code on the document has been consented to
- Document can only be viewed, it can not be incorporated or copied.
- use of this document shall result in an ATNA emergency access audit event
Models It has also been suggested that documents should simply be published with the expected codes, and that only on use of a document is ALL current consent policies are evaluated against with the code on the document. In this way revocation is more dynamic. This model was not fully expressed in BPPC.
Possible Privacy Policies
BPPC can not support all forms of privacy policies. This is a list of potential policies.
It is fully expected that these policies would need to include very specific language around defining exactly what they mean. For example an Opt-In policy does not mean that any person has access, there would be well written rules about what types of structural and functional roles are allowed access under specific conditions and workflows. For example: This would make clear what access the dietary staff have to the information in order to properly prepare the food diet. It would outline what minimal information is provided to billing, and what allowances there are for system maintenance. It would include references to recourse and patient right to change or access. It would include conditions at which the normal access could be overridden by emergencies including safety to patient, safety to providers, safety to public, etc. Even the most simple policy must be spelled out in very exacting detail.
- Opt-In to clinical use
- Opt-Out of sharing outside of local event use, allowing emergency override
- Opt-Out of sharing outside of local event use, without emergency override
- Specific document is marked as available in emergency situations
- Additionally allow specific research project
- Additionally allow specific documents to be used for specific research projects
- Limit access to functional roles (eg: healthcare) (direct care) providers
- Limit access to structural roles (eg: organizational) (radiologist, cardiologist, billing clerk)
- multiple policies apply to each document
- Change the consent policy (change from opt-in to opt-out)
- Allow direct use of the document, but not allowed to re-publish
- when the document is published on media using XDM
- when the document is published point-to-point using XDR
- when the document is retrieved across communities using XCA
These might be possible depending on complex additional services that are not known at this time.
- Allow access only to care providers with a direct treatment relationship
- Spouse not allowed access (to all or specific document)
- Parent is not allowed access (to all or specific document)
- Restrict access to a specified care-setting
- All accesses to the data will result in a notification of the patient (eg: email or such)
- All accesses to the data require that a new consent be captured (eg: capture new signature)
- when HL7 v2 or v3 messages are used. This would require further profiling of the use of confidentialityCode in those messages.
- when DICOM is used. This would require further profiling of the use of confidentialityCode in those messages.
- temporarly allowing a use of a document that would be not allowed by the current policies. This could be done with a new consent being registered that is soon after deprecated, but this is not very good solution.
- Patient identifies individuals that have rights to their data
- Patient identifies individuals that do not have rights to their data
- Each access of the data must be individually authorized by the patient
- a document with a mixture of more/less sensitive information thus needing different levels of protection
All systems publishing or using XDS. Also may apply to XDR and XDP.
- EHR System
- PACS System
- EMR System
The BPPC profile is very clearly "Basic" because we know that there is many gaps in what we can do vs what is desired.
HL7 is working hard to define a vocabulary that can be used to capture consents in computer processible form.
This should also look at combinatorial logic where multiple policies may apply, and where mixture of policies apply to different parts of the document/message.
Protecting more than Documents
The same confidentialityCode mechanism that BPPC sets up for XDS Metadata can be used in HL7 messages and DICOM transactions. In both cases there is already a confidentialityCode that is defined for this purpose. The important part is to have a policy domain declare that the confidentialityCode is constrained to a specific vocabulary and that this vocabulary must be enforced.
<List References (good and bad) (with link if possible) to Journal Articles that mention IHE's work (and hopefully include some analysis) >
Middle East Technical University, Turkey
See Implementation Experiences On IHE XUA and BPPC December 5, 2006; Tuncay Namlı and Asuman Dogac, Software Research and Development Center, Middle East Technical University, Ankara, Turkey
IHE Kickoff meeting in New Brunswick
The notes from this meeting May 2006.
Profile Status: Trial Implementation
The Patient Care Coordination Technical Framework is the official master document for this Profile.
The BPPC FAQ answers typical questions about what the Profile does.
The BPPC Purchasing describes considerations when purchasing equipment to deploy this Profile.
The BPPC Implementation provides additional information about implementing this Profile in software.
This page is based on the Profile Template