Skip to Main Content

Privacy and Security Solutions for Interoperable Health Information Exchange

 

Assessment of Variation and Analysis of Solutions

 

Prepared for:

Agency for Healthcare Research and Quality
U.S. Department of Health and Human Services
540 Gaither Road
Rockville, MD 20850
www.ahrq.gov

Jodi Daniel, JD, MPH, Director
Steven Posnack, MHS, MS, Program Analyst
Office of Policy and Research

Office of the National Coordinator
330 C Street SW
Switzer Building, Room 4090
Washington, DC 20201

 

Prepared by:

Linda L. Dimitropoulos, PhD
RTI International
230 W Monroe, Suite 2100
Chicago, IL 60606

 

Contract Number 290-05-0015
RTI Project Number 0209825.000.007

AHRQ Publication No. 07-0080-1-EF
July 2007

RTI International is a trade name of Research Triangle Institute.


The authors of this report are responsible for its content. Statements in the report should not be construed as endorsement by the Agency for Healthcare Research and Quality or the U.S. Department of Health and Human Services.

Identifiable information in this report or presentation is protected by federal law, Section 924(c) of the Public Health Service Act, 42 U.S.C. § 299c-3(c). Any confidential identifiable information in this report or presentation that is knowingly disclosed is disclosed solely for the purpose for which it was provided.


Contents

Executive Summary

1. Background and Purpose
     1.1 Description of the Purpose and Scope of This Report
     1.2 Level of HIT Development in States
     1.3 Description of Report Limitations

2. Assessment of Variation
     2.1 Methodology
          2.1.1 Steering Committee Composition
          2.1.2 VWG and LWG Membership
          2.1.3 Outreach to Stakeholders to Gather Variations
          2.1.4 Outreach Methods
          2.1.5 List of Stakeholders
          2.1.6 Approaches to Conducting the Work
     2.2 Treatment (Scenarios 1–4)
          2.2.1 Stakeholders
          2.2.2 Domains
          2.2.3 Critical Observations
     2.3 Payment (Scenario 5)
          2.3.1 Stakeholders
          2.3.2 Domains
          2.3.3 Critical Observations
     2.4 Regional Health Information Organization (RHIO; Scenario 6)
          2.4.1 Stakeholders
          2.4.2 Domains
          2.4.3 Critical Observations
     2.5 Research Data Use Scenario (Scenario 7)
          2.5.1 Stakeholders
          2.5.2 Domains
          2.5.3 Critical Observations
     2.6 Law Enforcement (Scenario 8)
          2.6.1 Stakeholders
          2.6.2 Domains
          2.6.3 Critical Observations
     2.7 Prescription Drug Use (Scenarios 9 and 10)
          2.7.1 Stakeholders
          2.7.2 Domains
          2.7.3 Critical Observations
     2.8 Health Care Operations and Marketing (Scenarios 11 and 12)
          2.8.1 Stakeholders
          2.8.2 Domains
          2.8.3 Critical Observations
     2.9 Bioterrorism Event (Scenario 13)
          2.9.1 Stakeholders
          2.9.2 Domains
          2.9.3 Critical Observations
     2.10 Employee Health Information (Scenario 14)
          2.10.1 Stakeholders
          2.10.2 Domains
          2.10.3 Critical Observations
     2.11 Public Health (Scenarios 15–17)
          2.11.1 Stakeholders
          2.11.2 Domains
          2.11.3 Critical Observations
     2.12 State Government Oversight (Scenario 18)
          2.12.1 Stakeholders
          2.12.2 Domains
          2.12.3 Critical Observations

3. Summary of Key Issues Raised by the State Teams in the Assessment of Variation
     3.1 Variation in the Interpretation and Application of Consent
          3.1.1 Consent for Treatment, Payment, and Health Care Operations
          3.1.2 Specially Protected Information
          3.1.3 Challenges Ahead
     3.2 Misunderstandings and Differing Applications of HIPAA Privacy Rule Requirements
          3.2.1Minimum Necessary
          3.2.2 Re-release or Redisclosure of PHI Obtained from Another Provider
          3.2.3 Importance of Human Judgment Factor in Disclosures
          3.2.4 Accounting of Disclosures
          3.2.5 General Issues
     3.3 Misunderstandings and Differing Applications of the HIPAA Security Rule
     3.4 Security
          3.4.1 Authentication and Authorization
          3.4.2 Inadequate Application-Level Data Access or Screening Controls
          3.4.3 Audit Programs
          3.4.4 Secure Transmission of Personal Health Information
          3.4.5 Lack of a Sound Security Infrastructure
          3.4.6 Variability in Administrative and Physical Safeguards
     3.5 Trust in Security
     3.6 State Laws
     3.7 Networking Issues
     3.8 Linking Data from Multiple Sources to an Individual
          3.8.1 Types of Patient Identification Used
          3.8.2 Different Identification Systems: Common Challenges
          3.8.3 Patient Identification: Consumer Communication and Education
     3.9 Interstate Issues
     3.10 Disclosure of Personal Health Information
          3.10.1 Interpretation of Requirements for the Re-release or Redisclosure of Health Information
          3.10.2 Differences in How Specially Protected Health Information Must Be Treated
          3.10.3 Issues of Ownership of Health Information
          3.10.4 Need for Fast, Easy, and Secure HIE Under Medical or Health Emergency Circumstances
          3.10.5 Variations in Interpretation of Reporting Requirements for Public Health Purposes
          3.10.6 Handling of Disclosures Related to Judicial Proceedings and Law Enforcement
     3.11 Cultural and Business Issues

4. Review of State Solution Identification and Selection Process
     4.1 Solutions Work Group Formation
     4.2 Process Used to Identify and Propose Solutions
     4.3 Process Used to Vet, Evaluate, and Prioritize Solutions
     4.4 Determination of Feasibility

5. Analysis of State Proposed Solutions
     5.1 Reducing Variation: Practice or Policy Solutions
          5.1.1 Interpreting and Applying the HIPAA Privacy Rule
          5.1.2 Uniform Consent
          5.1.3 Policies to Govern Interstate Exchange
     5.2 Legal or Regulatory Issues
          5.2.1 State Laws: Finding and Interpreting Them
          5.2.2 State Law Governing Secure Exchange of Health Information
          5.2.3 Intersection of State and Federal Regulations (HIPAA Rules, 42 C.F.R. pt. 2, CLIA Rules)
     5.3 Technology and Standards
          5.3.1 Data Security and Transmission
          5.3.2 Patient Identity Management
          5.3.3 Segmenting Data
          5.3.4 Standards That Affect Technology
     5.4 Education
          5.4.1 Consumer Education
          5.4.2 Provider Education
          5.4.3 Integrated Education
          5.4.4 Education Targeted to Specific Groups
     5.5 Implementation and Governance of Privacy and Security Solutions
          5.5.1 General Implementation and Governance Issues
          5.5.2 Governance and Implementation of HIEs
     5.6 Ancillary Issues and Solutions
          5.6.1 Funding
          5.6.2 Incentives/EHR Adoption Issues
          5.6.3 Stakeholder Engagement

6. National-Level Recommendations
     6.1 National Standards
          6.1.1 National Standards for Transferring Health Information Among States
          6.1.2 National Standard for Health Information Exchange-Related Business Associate Agreements
          6.1.3 Standardized Model National Consent Form
          6.1.4 Centralized Model Regulation Process
          6.1.5 National Oversight Body
     6.2 Clarifications/Revisions to Federal Regulations
          6.2.1 HIPAA Privacy Rule Revisions/Clarifications
          6.2.2 Clarify Legal Status Under HIPAA of Entities Participating in a Health Information Exchange
          6.2.3 Confidentiality of Alcohol and Drug Abuse Patient Records (42 C.F.R. pt. 2)
          6.2.4 Revision or Amendment to CLIA Regulations
          6.2.5 Clarification of Medicaid Data Disclosure
     6.3 Funding
          6.3.1 Funding for More Widespread Adoption of Technology
          6.3.2 Funding for Educating Patients and Consumers

7. Moving States Forward Collectively
     7.1 Coordinating Standards and Policy
     7.2 Coordinating HIEs Between States
     7.3 Coordinating Legislation

8. Conclusions and Next Steps

Appendices

A. State Summaries
B. Descriptions of Health Information Exchange Development and Health Information Technology Adoption by State
C. List of Stakeholders
D. Glossary of Acronyms


Tables

2-1. Number of States Including Members from Major Stakeholder Groups on Steering Committee
2-2. Number of States Including Members from Major Stakeholder Groups on Variations Work Group and Legal Work Group
2-3. Number of Stakeholders Engaged in Assessment of Variation Process (All States Combined)
2-4. Stakeholder Groups Engaged in Scenario 1–4 Reviews
2-5. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 1–4 (N = 34)
2-6. Stakeholder Groups Engaged in Scenario 5 Reviews
2-7. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 5 (N = 34)
2-8. Stakeholder Groups Engaged in Scenario 6 Reviews
2-9. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 6 (N = 26)
2-10. Stakeholder Groups Engaged in Scenario 7 Reviews
2-11. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 7 (N = 34)
2-12. Stakeholder Groups Engaged in Scenario 8 Reviews
2-13. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 8 (N = 34)
2-14. Stakeholder Groups Engaged in Scenario 9 and 10 Reviews
2-15. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 9 and 10 (N = 34)
2-16. Stakeholder Groups Engaged in Scenario 11 and 12 Review
2-17. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 11 and 12 (N = 34)
2-18. Stakeholder Groups Engaged in Scenario 13 Reviews
2-19. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 13 (N = 34)
2-20. Stakeholder Groups Engaged in Scenario 14 Reviews
2-21. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 14 (N = 34)
2-22. Stakeholder Groups Engaged in Scenario 15–17 Reviews
2-23. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 15–17 (N = 34)
2-24. Stakeholder Groups Engaged in Scenario 18 Reviews
2-25. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 18 (N = 32)

4-1. Stakeholder Group Representation of Solutions Work Group Members
4-2. Stakeholder Group Engagement in Solutions Development and Evaluation


EXECUTIVE SUMMARY

This report is the fourth in a series to be produced under RTI International's contract with the Agency for Healthcare Research and Quality (AHRQ). The contract, entitled Privacy and Security Solutions for Interoperable Health Information Exchange, is managed by AHRQ and the Office of the National Coordinator for Health Information Technology (ONC). The following report is a summary of 34 separate final reports submitted by 33 states and one territory as subcontractors to RTI; these subcontractors form the Health Information Security and Privacy Collaboration (HISPC). 1  The Assessment of Variation and Analysis of Solutions (AVAS) report comprises the final reports submitted by the 34 subcontracted state teams and represents a "final look" at the major areas states have identified as presenting challenges to the privacy and security of electronic health information exchange and potential solutions to those issues raised. This summary report captures the highlights from the 34 reports and presents some of the major crosscutting themes that have been raised during the state teams' discussions.

This summary report consists of 8 major sections:

Background and Purpose

The purpose of the AVAS is to illustrate, in a descriptive report, the variations among the organization-level business practices, policies, and laws, related to privacy and security, as identified by each state team. The term law as used here refers to regulatory, statutory, or case law that serves as the primary driver behind a business practice. The AVAS reports also describe the process for identifying and proposing potential solutions, including an explanation of how state teams are evaluating and prioritizing the solutions and their feasibility. The information summarized in this report was provided by each of the state teams as a result of the work conducted by the Variations Work Groups (VWGs), Legal Work Groups (LWGs), and Solutions Work Groups (SWGs) of each participating state team. The information also forms the basis for the work being conducted by the Implementation Planning Work Groups (IPWGs) as the state teams finalize their implementation reports. Although the AVAS reports are final, the work continues as the state teams work with stakeholders toward developing privacy policy and security standards to address the needs of their local communities.

Although each state team followed a core methodology, ample opportunity remained to tailor the process to meet the needs of each participating state and territory. The reports include a section that documents the process used to generate the set of organization-level business practices for each scenario, including outreach to the broader stakeholder groups, and a description of the membership and stakeholder representation of the VWGs, LWGs, and SWGs. Each state team followed an outline that provided an a priori categorization for potential solutions based on whether the potential solution effected a change in organization-level practice or policy, state law or regulations, federal law or regulations, or specifically impacted interstate electronic health information exchange. Although this categorization was recommended, state teams were given the opportunity to tailor the categorization to meet the needs of their specific participating state or territory. The reports also included a section in which state teams could discuss potential solutions that would require implementation at the national level. The outline and content of the AVAS reports are described in Table ES-1.

Table ES-1. Outline of Assessment of Variations and Analysis of Solutions Report
Section Title Content
Section 1—Background and Purpose Purpose and scope of this report
Description of level of health information technology (HIT) development in the state/territory
Description of report limitations
Section 2—Assessment of Variation Brief description of the methodology
Description of variation identified, organized by scenario including stakeholders, domains, and critical observations
Section 3—Summary of Key Issues Raised by the State Teams in Assessment of Variation Discussion of the key areas of variation as identified by the state teams
Section 4—Review of State Solution Identification and Selection Process Description of the state Solutions Work Group, its charge, membership and stakeholder representation
Description of the process the state used to identify and propose solutions
Description of the process the state used to vet, evaluate, and prioritize solutions
Description of how state determined the level of feasibility of identified solutions
Section 5—Analysis of State Proposed Solutions Solutions to issues driven by variation in organizational business practices and policies (but not state laws)
Solutions to issues driven by state laws/regulations
Solutions to issues related to technology and standards
Solutions to issues related to education
Solutions to issues related to implementation and governance
Solutions to collateral issues
Section 6—National-Level Recommendations National standards related to draft model legislation, business agreements, uniform patient consent/authorization forms, national oversight body
Clarification/revisions to federal regulations
Funding
Section 7—Moving States Forward Collectively Coordinating standards and policy
Coordinating legislation
Section 8—Conclusions and Next Steps Discussion of the implementation plans

Summary of Assessment of Variation

The descriptions of business practices in each of the HISPC reports are organized by 11 purposes for health information exchange (HIE), as shown in Table ES-2. These purposes represent clusters of the 18 scenarios used to drive the discussions of business practices. Within each of the 11 sections, each state team was asked to provide a description of (1) the stakeholders who provided input to the collection of business practices; (2) the major domains addressed by the business practices (based on the 9 domains of privacy and security) including a discussion of the relevant policy, legal drivers, or rationale behind the practices; and (3) critical observations not offered elsewhere in the report. Finally, each state report provided a summary of the critical observations and key issues that the SWGs and the IPWGs further explored.

Table ES-2. Purposes of Health Information Exchange (HIE) and Relevant Scenarios
Purposes of HIE Relevant Scenarios
Treatment Scenarios 1–4
Payment Scenario 5
Regional health information organizations (RHIOs) Scenario 6
Research data use Scenario 7
Law enforcement Scenario 8
Prescription drug use/benefit Scenarios 9 and 10
Health care operations/marketing Scenarios 11 and 12
Bioterrorism Scenario 13
Employee health Scenario 14
Public health Scenarios 15–17
State government oversight Scenario 18

Summary of Key Issues in the Assessment of Variation

The AVAS report describes 10 major issues that state project teams raised as having broad implications for private and secure nationwide electronic health information exchange. This section provides a brief overview of these topics, which is not intended to be a thorough analysis of the issues or their implications, but rather a descriptive treatment of the issues.

Variation in the Interpretation and Application of Consent versus Authorization 2 

The state teams have identified broad variation in the use and implementation of patient consent and authorization. The terms are often used interchangeably although they have two distinct definitions and separate uses under various federal and state laws. For example, the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule requires patient authorization for any uses and disclosures of protected health information (PHI) not otherwise permitted or required by the Privacy Rule. In contrast, the Privacy Rule permits, but does not require, the obtaining of consent for uses and disclosures of PHI for treatment, payment, and health care operations purposes. Further, the term consent has a specific meaning pursuant to the provisions of 42 C.F.R. pt. 2 (alcohol and chemical dependency). Despite the specific legal definitions, the terms patient consent and patient authorization have been used interchangeably by some state teams to refer to the need for (perceived or otherwise) and the actual process of obtaining appropriate approval from a patient (who is the subject of the information) or a corresponding legal guardian or representative before use or disclosure of the patient's health information. Included are specific discussions regarding consent for treatment, payment, and health care operations; special rules for disclosure of sensitive information; and challenges ahead for devising an approach to managing permissions necessary to permit electronic exchange.

Differing Interpretations and Applications of HIPAA Privacy Rule Requirements

State teams reported many business practice variations based on different interpretations and applications of the requirements of the Privacy Rule. This variation was not unexpected and is the result of the intentional flexibility and scalability of some of the Privacy Rule's requirements (eg, minimum necessary and reasonable safeguards). The most commonly mentioned issues were variability in application of the minimum necessary standard and the use and implementation of patient consent, which the Privacy Rule permits but does not require, or authorization, across organizations.

Misunderstandings and Differing Applications of the HIPAA Security Rule

The state teams indicated that stakeholders misunderstood and were confused about appropriate security practices; moreover, they also misunderstood what was currently technically available and scalable to the health care industry and consumers. This lack of knowledge, understanding, and trust among organizations and stakeholders was more evident in the business practices than in state laws. For the most part, state laws did not pose challenges to sound security, nor did the HIPAA Security Rule.

Security

Authentication and Authorization. A number of state teams identified the need for standard authentication and authorization protocols to permit electronic health information exchange. State teams noted that the lack of a common method for authenticating individuals created mistrust between organizations. Currently, some organizations will accept a phone call or a fax from a known staff member at the requesting organization to authenticate the request and disclose the information. This is typical if the organizations have a previously established relationship. However, the same organization may impose a stricter requirement on other organizations including the requirement that the patient or individual sign a consent form (although not necessarily required by law) before the personal health information is exchanged. It becomes a cumbersome process that does not lend itself well to electronic health information exchange.

Inadequate Application-Level Data Access or Screening Controls. The state reports clearly indicate that many stakeholders are not using or are not familiar with currently available technologies. A critical issue identified by stakeholders that are either current users or exploring available technologies are the inadequacies in existing applications used to manage personal health information and for HIE, including electronic health records (EHRs) and data repositories. For example, some stakeholders indicated that they were required to print out copies of records from EHRs and redact especially sensitive information, or information that should not otherwise be disclosed, because the EHRs did not accommodate segregation of certain types of data. The current business practice is to print a paper copy, redact the information, and fax the redacted copy of the record to the intended recipient.

Audit Programs. Several state teams indicated that the poor auditing capability of current software applications is a challenge to electronic health information exchange and that it is particularly problematic when the management of community health records or HIEs was discussed. Adequate audit processes mean more than activating the appropriate audit logs; they include the development and regularly scheduled use of an appropriate audit program that addresses potential privacy and security risks and is based on an established set of audit criteria that match the organization's needs.

Secure Transmission of Personal Health Information. Several state teams identified the secure transmission of personal health information between health care organizations, and between health care organizations and consumers, as a significant issue. Reports cited the lack of interoperable solutions and the high cost of implementing appropriate forms of secure transmission that protect the data in transit and protect against inappropriate interception and potential modification.

Lack of a Sound Security Infrastructure. A number of the state reports addressed interorganizational security issues but did not examine barriers related to these issues (administrative, physical, and technical). The lack of appropriate security program investment by health care and related organizations stems generally from 3 areas that should be reviewed and addressed at the organizational, state, and federal levels, including lack of knowledge about appropriate security practices and HIPAA Security Rule requirements; lack of investment in security on the part of the industry; and the method by which the HIPAA Security Rule is enforced by the US Department of Health and Human Services.

Variability in Administrative and Physical Safeguards. State teams noted that the lack of adoption of consistent and appropriate administrative and physical safeguards within health care organizations has resulted in mistrust between organizations and increased concerns related to liability (where an organization with a sound security program transmits personal health information to an organization that lacks a sound security infrastructure). This issue is not related to technology; rather, it involves lack of understanding about, or insufficient emphasis on, appropriate security for any size organization. State teams noted that reducing the variability in the application of administrative and physical security would do much to reduce certain challenges to electronic health information exchange, improve trust among organizations, and reduce liability concerns.

Trust in Security

Providers were principally concerned about potential liabilities from the activities of other participants in electronic health information exchange and about consumers' lawsuits for errant or inappropriate disclosures of their information. One state identified the concern about trust as the single most significant issue, one which had been repeatedly raised by stakeholders and the reason providers were not willing to participate in HIEs.

The second most commonly reported trust issue was consumer lack of trust in electronic health information exchange. The primary concern consumers raised was related to payer and employer access to health data and, secondarily, distrust of new technologies.

State Laws

Organizations vary widely in how they identify, locate, and apply existing state law. Some organizations use the HIPAA Privacy Rule as a ceiling rather than as the federal floor. In many states, the relevant state law is fragmented and scattered throughout many chapters of state law, making it difficult to find. In addition, the laws frequently conflict, are antiquated, and do not apply to electronic health information exchange.

Networking Issues

Most state teams were concerned about the lack of well-defined, operational, and deployable models for regional networking, which created a gap between policy development and practical application; in some states, this gap made it difficult to engage stakeholders in the policy work.

Linking Data from Multiple Sources to an Individual

The ability for a health care provider to identify the correct records for a patient is critical to clinical medicine and to electronic health information exchange. The lack of a standard, reliable way of accurately matching records to patients introduces the potential for inappropriate use and disclosure of personal health information, and inappropriate clinical decision-making issues that are both a clinical and a privacy risk.

Interstate Exchange Issues

Although the identification of interstate issues was not a primary focus of the interim assessment of variation, more than half the state teams reported that interstate issues should be considered and that agreements among states must be made to facilitate the exchange. States typically raised interstate issues because health care facilities draw patients from across state lines or because states experience very large seasonal inflows of both out-of-state workers and tourists.

Disclosure of Personal Health Information

The state teams reported multiple sources of variation in business practices related to the disclosure of health information:

Cultural and Business Issues

State teams referenced cultural and business issues that pose challenges to electronic health information exchange.

Review of the Solution Identification and Selection Process

A number of factors affected the approach that each state team took to developing solutions to the challenges and barriers to private and secure electronic health information exchange. Teams that represented states with existing HIEs or states that have done significant work toward implementing electronic health information exchange provided some very detailed and specific analyses of the technical issues related to data security and standards. Teams representing states in the early stages of planning for electronic health information exchange tended to focus more on understanding the sources of variation that were identified; making decisions about the role of human judgment and how to build trust into the system; and developing governance structures and the need for oversight bodies and funding. Other factors also contributed to the variation in the reports, including the level of fragmentation of state laws. States with highly fragmented state privacy law focused on resolving that source of variation while states with relatively little or no state law governing privacy and security of electronic health information exchange discussed the possible need for legislation. On the other hand, some state teams with fairly stringent state privacy laws discussed the potential need to make changes to permit electronic health information exchange. Their struggle is the balance between ensuring the privacy and security requirements of their communities and maximizing the benefits of electronic health information exchange to the community.

Summary of Solutions

While many of the identified solutions were specific to a state, a number of common themes, issues, and solutions clearly surfaced. Generally, states' solutions fell into one or more of the following broad common areas that serve as a source of variation.

Reducing Variation: Practice or Policy Solutions

State teams identified the greatest amount of variation in organizations' interpretation and application of the HIPAA Privacy and Security Rules, including its minimum necessary standard. The Privacy Rule is frequently cited as limiting exchange, even though it generally allows the use or disclosure of protected health information, without authorization, for treatment, payment, and health care operations. All state teams agree that to reduce the current existing variation that poses challenges to interoperable electronic health information exchange, organizations and states must agree on some common interpretations and applications of the HIPAA Rules and develop some uniform policy. In addition to broad agreement on the need for policy development, the state teams also advanced many specific recommendations for detailed policy development. The state teams agreed on the need to define parameters for standard use and disclosure, including specifying the purpose and use of the data, consent and authorization policies and procedures, data use limitations, data collection limitations, and requests for restrictions on data use and disclosure, patient notification (including accounting and audit of prospective and retrospective data uses and disclosures), and patient education (including information about patient rights, granting of consent, and others). State teams also agreed about the need to establish a standardized or uniform patient consent form and process to be adopted by the entire health care industry. A number of states indicated that the uniform consent form and policy should clearly reflect patients' rights to information in their medical records and provider confidentiality principles. Another state team added that state law should determine general consent requirements, consent principles relative to condition-specific consent requirements, interstate information exchange, information exchange with payers and employers, use of information for marketing, and waivers of consent when the patient's life is at risk and in public health emergencies.

Legal or Regulatory Solutions

Four state teams identified another source of variation driven, in part, by difficulties identifying and interpreting state law that is frequently fragmented and scattered. In addition, once found, the laws sometimes conflict with one another. This situation is further complicated by misunderstanding of how the state law intersects with federal laws and regulations. A number of state teams have proposed plans to consolidate statutes related to HIE to facilitate review to identify conflicting or outdated state laws.

State teams were also concerned about restrictive or outdated state laws that currently do or may in the future govern private and secure electronic health information exchange. Many states have no clear comprehensive privacy approach or any current body of state law governing electronic health information exchange. A number of state teams noted the need to update state laws and regulations to address provisions that inadequately address interoperability of electronic health information exchange and to reconcile the differences between state laws and the Privacy Rule. Some specific recommendations that should be included in a comprehensive approach include exploring the creation of new laws/policies to protect health care information held by third-party custodians. State teams also recommended amending existing laws/policies to ensure patients have access to their health information in electronic format, where available. One state specifically proposed making modifications to state statutes to resolve differences regarding when and how patient consent is required to exchange patients' health information. The team also identified the need to define undefined terms and ambiguous concepts in state patient consent requirements (such as health record); add language to clarify application of the state's patient consent requirements to new concepts in electronic health information exchange; and update the state's patient consent requirements to allow mechanisms that facilitate the electronic exchange of patients' information while respecting patients' ability and wishes to control their information.

Additional recommendations include the following:

Recommendations were also offered to address differences between state and federal laws dealing with inconsistent and sometimes conflicting requirements for patient consent; disclosure of sensitive health information; security requirements such as data protection, including business agreements, authentication, authorization of all individuals and their delegates; protection of data at rest in each party of an exchange; and protection of data in transit.

Similarly, a number of state teams identified the need to address inconsistencies between federal and state laws and regulations in areas such as sharing of specially protected health information (eg, mental health and substance abuse data); Medicaid data sharing; interstate data sharing; state-to-local data sharing; data sharing for research; and data sharing in an HIE.

Technology/Data Standard Solutions

A number of state teams proposed the development of a standard national data format to document consent that recognizes the differing state-based consent policies, laws, and regulations but also promotes normalization and common application. In addition, a number of state teams, citing the need for patients to have more control over access to their health records, recommended that higher access standards/restricted access standards be developed for select information. These teams also indicated a need to educate patients on how, when, and why to control access to their information. Another recommendation was that states develop mechanisms and standards under which patient notification and a full audit trail is provided when specially protected information is requested and accessed.

A number of states proposed solutions for managing patient identity. The ability of a health care provider to identify the correct records for a patient is critical to clinical medicine and to electronic health information exchange. The lack of a standard, reliable way to accurately match records to patients introduces the potential for inappropriate use or disclosure of health information about the wrong patient, both a clinical and a privacy risk. This problem is particularly acute when information is shared across institutions that have different methods of patient and record identification. All state teams noted the need for the ability to correctly identify patients, and most states recommended potential ways to accomplish this goal. Some recommendations include:

A number of state teams reported the need for systems that can segregate data to allow for controlled access to specially protected data and to allow patients to control access to portions of their records.

Education

All states recognize the need for varying levels of education to reduce variation in how policies are applied and also to increase stakeholder awareness and trust in the systems. The most common recommendations were for educational campaigns directed at patients and consumers and training programs for providers and organizations. Some examples include:

Implementation and Governance of Solutions

One goal of this project is to establish a state infrastructure that will allow the work to continue beyond the conclusion of this contract. To that end, a number of state teams have proposed an administrative or governance body to oversee the state's electronic health information exchange activities. Some recommendations are overarching to include all activities related to electronic health information exchange advancement and define the source of authority, operational structure, rules of the governing body, rules of participation in an electronic health information exchange network, and service offerings of the oversight entity. Other state teams propose forming entities to govern specific areas. For example, some state teams have proposed the establishment of an HIE Privacy and Security Advisory Board to oversee key aspects of privacy and security for statewide HIE. States also proposed establishing an information technology privacy and security committee to recommend standard privacy and security policies, procedures, and technology controls. Some states also suggested the formation of legal committees to recommend legal solutions to privacy and security issues.

Ancillary Issues and Solutions

Funding. A few states recommended investigating the possibility of providing public and private financial incentives for organizations to implement best security and privacy practices. Many more states explored ways to fund electronic health information exchange activity in the broader context, including providing incentives for adoption of technology. Although not directly related to the development of privacy policy and security standards, the funding and adoption issues are closely related to maintaining momentum among stakeholders working on the policy issues. A few examples are included below:

Incentives/EHR Adoption. Financial incentives are an obvious solution to EHR adoption issues. Small providers, those located in rural or low-income areas, or providers with a large percentage of underinsured or uninsured patients, may face financial difficulty in purchasing and implementing EHR systems. The state teams proposed several types of incentives including tax incentives for providers, combinations of private and public incentives, and incentives for organizations that implement best practices in privacy and security. State teams also considered nonfinancial incentives, including a proposed mentoring program for providers who are implementing EHR systems.

Stakeholder Engagement. Although each state team is composed of representatives from a broad array stakeholders, all teams recognized the need for the continual engagement of stakeholders in discovery and solution development. Clearly, all state teams understood the need for ongoing consumer participation. A few examples of plans for engaging consumers are as follows:

In the majority of cases, stakeholder engagement included some form of educational programs.

Summary of National-Level Recommendations

The final section of the report summarizes the state teams' recommendations for solutions that would be most effectively implemented at the national level. The state project teams focused primarily on generating potential solutions that could be implemented at the local or state level. However, state teams also recommended solutions at the federal level that would be highly valuable to states as they develop privacy policy and security standards. Many ideas summarized in this section were also raised by other state teams as potential solutions to be implemented at the state level. The state teams that offered these preliminary thoughts about national level recommendations generally indicated that privacy policy and security standards for electronic health information exchange could achieve faster uptake if adopted at the national level rather than trying to come to agreement nationwide at the state level.

National Standards

Many state teams called for national standards to form a framework for nationwide electronic health information exchange. The teams recommended standardizing both a basic set of data elements and the accompanying technical standards for the interstate transfer of personal health information. All state teams expressed an interest in sharing data across state lines; however, some state teams felt strongly that the federal government would need to impose a national framework as a starting point that would include national standards that the states could use as a common basis for exchange. These state teams argued that without a national framework, the states will develop silos that will not be able to exchange data with one another, leading to a fragmented and disjointed system. Some state teams also noted that, while technical solutions can be designed and implemented at a regional level, they can lead to multiple and disparate approaches that would inhibit exchange among regions. National standards and guidelines could provide a platform to begin exchange discussions; states could alter it if necessary, but a similar core framework would be maintained from state to state. Similar arguments were proposed for the development and publication of a national standard for data sharing agreements.

National Standards for Transferring Health Information Among States. State teams most frequently called for national standards that would collectively guide the transfer of health information among states. Without a centralized effort, states could go in disparate directions or the effort will take far longer to coordinate.

National Standard for Health Information Exchange-Related Business Associate Agreements. 3  Similar arguments were proposed for the development and publication of a national standard for data sharing agreements, such as a business associate agreement (BAA).4 Eight state teams proposed that a standard BAA be established at the national level even though there is a national standard for BAAs and data use agreements in the HIPAA Privacy Rule.

Standardized Model National Consent Form. The state teams indicated that a model consent form is one of the essential components to encourage data sharing among organizations and across states. Many state teams have proposed solutions about the development of statewide uniform consent models. State teams recommending a model national consent form recognize that each state must be concerned with the unique state laws that affect their consent process, but they also recognize that using a common template to build upon will decrease variation.

Centralized Model Regulation Process. To develop a centralized model regulation development process, state teams suggested a range of options: a national effort to provide structured guidance to the current national standard setting bodies, a centralized national process to examine the role of emerging standard setting organizations, and working with the National Conference of Commissioners on Uniform State Laws (NCCUSL) to broker a set of model legislation. All states proposing this recommendation felt that some national-level oversight was needed in the production of model standards or model legislation.

National Oversight Body. Three state teams proposed that an organized authority or oversight body guide the standardization of privacy and security implementation among states. Although all 3 states provided different alternatives, the sentiment was that this oversight could accelerate the adoption of recognized model laws, contracts, policies, and procedures among participating entities in an HIE. The state teams also recommended that the national oversight body oversee a consistent national educational campaign to consumers that will lead to greater public understanding and electronic health information exchange participation.

Clarifications/Revisions to Federal Regulations

The second most frequent set of issues raised by the state teams that offered national-level recommendations included recommended revisions and clarifications to federal regulations, including HIPAA Privacy Rule, 42 C.F.R. pt. 2, Clinical Laboratory Improvement Amendments (CLIA) regulations and Medicaid data disclosure regulations.

HIPAA Privacy Rule Revisions/Clarifications. Only 6 state teams recommended clarifications or revisions to the HIPAA Privacy Rule. One state team stated that clarification and perhaps revision of the Privacy Rule is necessary to reduce the variation in interpretation and application of Privacy Rule provisions across organizations and states.

Two states recommended that the Privacy Rule requirements for minimum necessary, de-identification, limited data set, and designated record set be reviewed for possible technical adjustments. Neither state elaborated on what types of technical adjustments were recommended, nor did they describe in the interim report what was problematic. Both state teams also recommended that the Department of Health and Human Services (HHS), Office for Civil Rights, develop new and more nuanced guidance.

One state pointed out the need to clarify appropriate electronic exchange guidelines to provide specific guidance concerning federal law restrictions about information types and classes, and also to provide solutions by which electronic personal health information can be viewed and exchanged outside established HIPAA standard transactions (eg, via EHR, electronic clinical notes, electronic health information exchange, and so forth).

One state team identified 3 potential changes to the Privacy Rule to reduce both administrative burden and variation. First, the state team noted that although the Privacy Rule introduced requirements intended to protect patient privacy, in some situations, the requirements provide nominal improvements in patient privacy protections over existing state law but increase administrative burdens in ways that may impede electronic health information exchange. The team's first proposed solution was to remove the requirement for BAAs and modify the statute to hold business associates directly accountable and liable for adhering to the Privacy Rule requirements. Second, the state team explained that interpretations and applications of the minimum necessary standard vary widely. The team proposed that states work to develop model policies and procedures to promote more consistent application of the minimum necessary standard. Finally, the team noted that prior to the HIPAA Privacy Rule, access to research information without patient consent was controlled by 45 C.F.R. pt. 46, the Common Rule, which applies to all research on Human Subjects. The Privacy Rule's requirements governing access for research purposes are deemed more protective of patient information than state laws; therefore, the Privacy Rule requirements control access without consent for research purposes. Under the Privacy Rule, generally, if researchers request access to identifiable health information as part of a research study, they must either obtain a waiver of authorization from the institutional review board (IRB) as part of the IRB approval process, or obtain authorization from all patients in the study.5 Because of the additional waiver criteria required by the Privacy Rule, many facilities have created privacy boards in addition to the IRB to evaluate and grant waivers. In evaluating a research proposal, an IRB is required to weigh the proposal's risks and benefits, including its impact on the confidentiality of patient health information. The state team agreed that IRB approval under the Common Rule is sufficient to protect patient confidentiality, and the team proposed that the federal government eliminate the Privacy Rule's additional waiver criteria.

Clarify Legal Status under HIPAA of Entities Participating in an HIE. Two state teams noted a need to clarify the legal status of certain entities participating in HIEs, including regional health information organizations (RHIOs), and to clarify whether they could be considered covered entities, business associates, or another as yet undefined category. The state teams noted a need to adopt a nationally accepted common definition of terms when referring to these organizations, their organizational and structural models and core components, their operational frameworks, and their legal standing in terms of liability.

Confidentiality of Alcohol and Drug Abuse Patient Records (42 C.F.R. pt. 2). Seven state teams raised issues related to 42 C.F.R. pt. 2, and 3 state teams proposed ways to manage the special protections governing the exchange of information that is protected by the federal Confidentiality of Alcohol and Drug Abuse Patient Records regulations (42 C.F.R. pt. 2).6 Two state teams proposed adopting technological solutions (such as using the continuity of care record to restrict transmission of specially protected data). Three other state teams proposed legislative or regulatory changes that may not be feasible but, nevertheless, highlight areas with which the state teams are struggling, including:

Revision or Amendment to CLIA Regulations. One state suggested a revision to the federal CLIA regulations. The federal CLIA regulations, 42 C.F.R. § 493.1291(f), currently provide as follows: "Test results must be released only to authorized persons and, if applicable, the individual responsible for using the test results and the laboratory that initially requested the test." The term authorized person is defined in 42 C.F.R. § 493.2 as "an individual authorized under State law to order tests or receive test results, or both." The term "individual responsible for using the test results" is not defined in the CLIA regulations, and its meaning is uncertain. The state team proposed that the CLIA regulations may pose a barrier to laboratories' exchange of health care information directly with the patient, with RHIOs, or with other similar organizations who may participate in electronic health information exchange.

Funding

Funding for More Widespread Adoption of Technology. Although this project focuses on issues related to private and secure electronic health information exchange, nearly all states raised the issue of low levels of technology adoption and the absence of a technical infrastructure as key barriers to their progress with the privacy and security work. Two state teams reported that national-level incentives could help sustain the momentum and prevent discussions from stagnating.

Funding for Educating Patients and Consumers. Two state teams called for education campaigns at the national level to reduce variation in practice. One state called for a national HHS public relations effort to provide a consistent, centralized, and visible source of education to the public.

Moving States Forward Collectively

The primary goal of each state team was to work toward solutions that would enable secure and private transfer of electronic health information between entities. However, the importance of collaboration in this project should not be ignored. Perhaps the greatest long-term effect of these activities will be the concurrent momentum built within each of the subcontracting states, the enthusiasm of which was not confined to state lines.

Conclusions and Next Steps

While the national-level recommendations summarized in Section 7 are an important outcome of the project, the final effort will focus on developing implementation plans for the state/territory-level solutions summarized in Section 5. These have been classified into 6 types of solutions:

The implementation plans for each of the state teams have been emphasized from the project's initiation. The project teams in each state and territory have been reminded that the government's purpose in funding this project has been not only to identify barriers to electronic health information exchange but also to solve them in a way that protects the privacy and security of health care consumers. The project has generated much discussion over the course of the past 10 months in steering committees and work group sessions, in stakeholder meetings, and in the regional meetings—as well as at the national meeting that was held in March 2007. These discussions have, in turn, resulted in stakeholders' commitments to fulfill the promises of improved health information exchange and to protect this information. In addition to a better understanding of barriers and proposed solutions, the perpetuation of this commitment is a major goal of the collaboration.

In developing their implementation plans, the state teams have been encouraged to focus on the practical and efficacious. As noted previously, conditions relevant to electronic health information exchange vary both within and between states. What works in one state may not work in another. The project teams have been encouraged to vet implementation plans with stakeholder groups in the same iterative process used to identify the variation in business practices, policies, and state laws to develop solutions that reduce variation and permit widespread electronic health information exchange in a private and secure way.

Based on the draft implementation plans provided by the teams in each state/territory, we anticipate the final implementation plans will include detailed plans to more forward in the following areas:

In addition to these concrete objectives, the project teams in each state/territory have provided practical considerations for accountability, funding, and specific timelines.


1. BACKGROUND AND PURPOSE

1.1 Description of the Purpose and Scope of This Report

Under the aegis of the Privacy and Security Solutions for Interoperable Health Information Exchange contract, RTI International has contracted with entities in 33 states and 1 territory to conduct an assessment of variations in business practices related to health information exchange, identify practices, policies, and laws that might be perceived as barriers to electronic exchange of health information, suggest possible solutions to these barriers, and prepare plans to implement these solutions.

This report documents and summarizes the Assessment of Variations and Analysis of Solutions (AVAS) reports submitted by the state and territory project teams. The Executive Summary from each of the individual state team reports is provided in Appendix A. Each state project team has prepared interim reports: the Interim Assessment of Variation report describes variation in business practices related to privacy and security in health information exchange and identifies those sources of variation that might inhibit electronic health information exchange; the Interim Analysis of Solutions report details solutions to reduce the variation and enable electronic health information exchange while preserving essential privacy and security protections. This report represents the integration and culmination of the project work in these areas.

This AVAS report describes and discusses variations among the organization-level business practices, policies, and laws—as related to privacy and security—that each state project team identified. The term law as used here refers to regulatory, statutory, or case law that serves as the primary driver for a business practice. This AVAS report also describes the process for identifying and proposing potential solutions, including an explanation of how state project teams are evaluating and prioritizing the solutions and their feasibility.

1.2 Level of HIT Development in States

The state teams participating in this project represent several levels of health information technology (HIT) adoption and use. In their AVAS reports, state teams were asked to describe the status of HIT implementation within their state in order to provide context for proposed solutions. Appendix B provides a table that summarizes each state's level of HIE development and the level of adoption of HIT (when known). The references to low or high HIT development in this table are based on the state team's assessment; they are not the result of applying a consistent set of criteria across the reports. Even in states described as having sophisticated HIT, some regions do not have access to systems.

1.3 Description of Report Limitations

Thirty-one of the 34 reports discussed limitations, and the constraint of the project schedule was a common theme. States uniformly indicated time constraints meant that proposed solutions were preliminary and that further work would be required to operationalize the solutions. Specific constraints included difficulties in scheduling meetings with busy stakeholders, overcoming project learning curves for stakeholders, engaging consumers, and the amount of out-of-meeting time individuals and groups needed to produce multiple solutions for review and analysis. States concluded that their solutions reports are works in progress as further work developing implementation plans often points to additional solutions worthy of pursuit.

A smaller set of state teams specifically described the lengthy process necessary for their stakeholders to reach consensus on prioritizing solutions for the report. For another state this set of limitations included the need for additional legal analysis of solutions to determine their legal feasibility.

A handful of states noted that their state stakeholders and participants were not familiar with electronic health record-related privacy and security environments in their workplaces. In such cases, lack of familiarity limited the project team's scope of analysis.

Most state teams reported no problems engaging stakeholders, with the exception of a number of states reporting difficulty engaging consumer or patient groups in a meaningful way. As they proceed with implementation plans, additional efforts are under way to ensure participation by consumers/patients and consumer advocacy groups.


2. ASSESSMENT OF VARIATION

2.1 Methodology

In June 2005 the US Department of Health and Human Services published the Summary of Nationwide Health Information Network Request for Information Responses, which contained the responses from 512 organizations and individuals. In this report, privacy and security considerations were crosscutting, and nearly every response cited the importance of "patient privacy and reiterated that the American public must feel confident that their health information is secure, protected, portable, and under their control" (p. 21). The report also noted major concerns among respondents about the varying interpretations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules being implemented by organizations and the challenges this variation would pose to nationwide electronic health information exchange. Respondents noted that the Privacy and Security Rules allow for 2 hospitals to develop 2 different business practices, both compliant, for protecting privacy and security of health care records and that this variation must be addressed if interoperable electronic health information exchange is to be achieved nationwide. Furthermore, the respondents noted that complications would exist both within and across states because of differences between state privacy laws and federal laws.

The purpose of this Privacy and Security Solutions for Interoperable Health Information Exchange project is to assess variations in organization-level business practices, policies, and state laws that affect electronic health information exchange and to identify and propose practical ways to reduce the variation to those "good" practices that will permit interoperability while preserving the necessary privacy and security requirements set by the local community. Because business practices are typically derived from business policies and law, uncovering the policy or legal driver on which the business practices are based is crucial to understanding how a current practice might be impacted by electronic health information exchange. Current laws or policies may prevent or impede electronic health information exchange, or perhaps may actually support and encourage electronic transfer, which would presumably make the exchange more efficient. By developing a complete understanding of the rationale for a business practice, whether paper-based or electronic, one can determine what elements should be retained as requirements for an electronic system of exchange and what, if any, policy or legal changes are needed to enable private and secure exchange. This report discusses the variations uncovered through this project as well as the proposed solutions. The final phase of the project will focus on outlining detailed implementation plans in a separate report.

The project methodology is based on three key assumptions. First, for stakeholders to trust electronic health information exchange, decisions about how to protect the privacy and security of health information should be made at the local community level. Second, to accomplish this goal, discussions must take place to develop an understanding of the current landscape and the variation that exists among organizations within each state and, ultimately, across states. Finally, stakeholders at the state and community levels, including patients and consumers, must be involved in identifying the current variation that exists, understanding the rationale that underlies the current business practices, deciding what the privacy and security requirements are, and developing solutions to achieve broad-based acceptance.

The 9 Domains of Privacy and Security
• User and Entity Authentication
• Authorization and Access Control
• Patient and Provider Identification
• Transmission Security
• Information Protection
• Information Audits
• Administrative and Physical Safeguards
• State Law
• Use and Disclosure Policy

State project teams followed a modified community-based research model that provided limited flexibility to each team to organize its leadership, steering committee, and work groups in ways appropriate to the needs of their current industry organization and market structure. Project teams followed a core methodology that framed discussions for the exchange of specific types of health information within 9 domains of privacy and security by using 18 scenarios as the starting point for work group discussions.

The Health Information Security and Privacy Collaboration (HISPC) comprises 33 states and one territory, Puerto Rico. Only one subcontracted organization, designated by the governor, is used per state. Each state and territory identified a steering committee that was a private-public partnership of leaders from state government and stakeholder organizations, and all work was conducted through a series of coordinated work groups with specific charges. Each state or territory was expected to reach out to a broad range of stakeholders to include, at a minimum:

• providers, • hospitals,
• payers, • public health agencies,
• federal health facilities, • community clinics and health centers,
• state government, • laboratories,
• pharmacies, • homecare and hospices,
• long-term care facilities and nursing homes, • correctional facilities,
• professional associations and societies, • quality improvement organizations, and
• medical and public health schools that undertake research, • consumers or consumer organizations.

The following sections summarize the various methods state project teams used to organize their respective leadership teams and work groups, the methods used to engage stakeholders in the process, and the methods each state and territory followed to conduct the interim assessment of variation. Further, the state project teams' findings are summarized by major domains of privacy and security. Finally, 10 crosscutting issues are summarized; (these issues were raised by the state teams in the interim assessment of variation).

The methodology sections of the 34 interim reports focused primarily on narrating the activities in which their work groups engaged to obtain a comprehensive set of business practices from the stakeholder community. State teams provided varying degrees of detail when they described the composition and subject matter expertise of their Variations Work Groups (VWGs) and Legal Work Groups (LWGs).

This report, by virtue of its subject matter, has certain limitations. This report summarizes the work conducted by project teams in 34 of the 56 states and US territories and, therefore, presents a "snapshot" of the current landscape in the 33 states and 1 territory that form HISPC, although many of the issues will be relevant to the entire nation.

2.1.1 Steering Committee Composition

All state teams were required to form a steering committee composed of state leaders and public and private stakeholders to provide leadership throughout the process and to sustain the effort beyond the end of the contract. Steering committee membership varied in accordance with the unique landscape and environment of each state and territory, but all committees were asked to include one member that represented the governor's office—either a senior policy advisor, cabinet member, or, in the case of one state, the lieutenant governor. The other members of the committees include high-level health care officials, such as directors of health insurance companies, health care, hospitals, and public health care systems. The number of states including a member from these and other stakeholder groups on their steering committee is provided in Table 2-1. Most states that provided details about their steering committee membership notably included members from private or public task forces focused on improving electronic health information exchange; also included were directors of information technology services across the spectrum of state and private health care systems, including many chief information and security officers.

Table 2-1. Number of States Including Members from Major Stakeholder Groups on Steering Committee
Stakeholder Group States Including Stakeholder Group in
Steering Committee Membership
(N = X) (%)
Providers 33 (97%)
Physicians and physicians groups 28 (82%)
Hospitals/health systems 28 (82%)
Professional associations and societies 23 (68%)
Clinicians 22 (65%)
Community clinics and health centers 15 (44%)
Mental health and behavioral health 13 (38%)
Pharmacies/pharmacy benefit managers 13 (38%)
Federal health facilities 10 (29%)
Long-term care facilities and nursing homes 8 (24%)
Safety net providers 8 (24%)
Homecare and hospice 7 (21%)
Other health care providers 6 (18%)
Emergency medicine 4 (12%)
Laboratories 4 (12%)
Technology and health information experts 33 (97%)
Quality improvement organizations 18 (53%)
Health IT consultants 17 (50%)
Electronic health records experts 14 (41%)
Regional health information organizations 13 (38%)
Privacy and security experts/compliance officers 13 (38%)
Health information management organizations 9 (26%)
Technology organizations/vendors 8 (24%)
Other health data and technology experts 5 (15%)
Other government 31 (91%)
Medicaid/state government except public health 30 (88%)
County government 4 (12%)
Payers 28 (82%)
Medical and public health schools/research 25 (74%)
Public health agencies or departments 25 (74%)
Legal counsel/attorneys 25 (74%)
Consumers 22 (65%)
Consumer organizations and advocates 17 (50%)
Individual consumers 12 (35%)
Employers 17 (50%)
Foundations/other policy consultants 2 (6%)
Other 1 (3%)
Law enforcement and correctional facilities 0 (0%)

The breadth of stakeholder representation on the steering committee varied across the 34 state project teams. Although only a few states provided the specific number of people on their steering committees in their reports, where numbers were provided, steering committees were generally smaller than other work groups and less representative of the broader stakeholder community from which they drew. Some states with large Native American populations included tribal representatives in both their steering committees and in their work groups. The state teams were required to engage consumers as individuals and as members of advocacy groups on their steering committees and in their work groups.

2.1.2 VWG and LWG Membership

Most state teams included details about the size and general composition of their VWGs and LWGs; see Table 2-2 for a list of states including members of certain major stakeholder groups in these two work groups. As a whole, states attended to the need for breadth of stakeholder representation on the VWG. Some states decided to increase the size of their VWG to provide sufficient breadth in the group itself, while other states preferred to have a smaller VWG that gathered required information from the broader stakeholder community to achieve appropriate representation across that community.

Table 2-2. Number of States Including Members from Major Stakeholder Groups on Variations Work Group and Legal Work Group
Stakeholder Group States Including Stakeholder
Group in Variations Work Group Membership
States Including Stakeholder
Group in Legal Work Group Membership
(N = 34) (%) (N = 34) (%)
Technology and health information experts 33 (97%) 34 (100%)
Privacy and security experts/compliance officers 24 (71%) 31 (91%)
Health IT consultants 22 (65%) 27 (79%)
Electronic health records experts 22 (65%) 21 (62%)
Quality improvement organizations 21 (62%) 14 (41%)
Regional health information organizations 17 (50%) 10 (29%)
Health information management organizations 16 (47%) 10 (29%)
Technology organizations/vendors 11 (32%) 8 (24%)
Other health data and technology experts 6 (18%) 6 (18%)
Providers 32 (94%) 5 (15%)
Hospitals/health systems 32 (94%) 4 (12%)
Physicians and physicians groups 30 (88%) 4 (12%)
Clinicians 29 (85%) 4 (12%)
Community clinics and health centers 27 (79%) 3 (9%)
Professional associations and societies 27 (79%) 2 (6%)
Pharmacies/pharmacy benefit managers 24 (71%) 1 (3%)
Long-term care facilities and nursing homes 21 (62%) 30 (88%)
Mental health and behavioral health 20 (59%) 21 (62%)
Homecare and hospice 17 (50%) 14 (41%)
Federal health facilities 16 (47%) 12 (35%)
Emergency medicine 16 (47%) 10 (29%)
Laboratories 15 (44%) 8 (24%)
Safety net providers 12 (35%) 8 (24%)
Other health care providers 3 (9%) 6 (18%)
Public health agencies or departments 31 (91%) 2 (6%)
Other government 29 (85%) 24 (71%)
Medicaid/state government except public health 27 (79%) 23 (68%)
County government 11 (32%) 22 (65%)
Payers 27 (79%) 4 (12%)
Medical and public health schools/research 23 (68%) 21 (62%)
Legal counsel/attorneys 22 (65%) 20 (59%)
Consumers 22 (65%) 17 (50%)
Individual consumers 16 (47%) 12 (35%)
Consumer organizations and advocates 17 (50%) 7 (21%)
Employers 17 (50%) 8 (24%)
Law enforcement and correctional facilities 15 (44%) 4 (12%)
Foundations/other policy consultants 3 (9%) 1 (3%)
Other 3 (9%) 0 (0%)

Although the states' work groups did not always fully represent the entire stakeholder community, states explicitly described the processes they used to engage those stakeholder groups not represented. All but a few of the state teams provided information about their VWG and LWG subject matter expertise as related to their particular stakeholder community. The few state teams that did not provide these details did describe the processes their work groups undertook to engage a wide variety of stakeholders to gather business practices. A few state teams explained in detail activities their VWG members engaged in to ensure a broader range of stakeholder involvement in gathering business practices. LWGs were smaller across the board, ranging from 8 members to as many as 22. All but 9 state teams included some information about their LWG members' subject area expertise; most of their expertise was in private or public health care–sector legal affairs.

2.1.3 Outreach to Stakeholders to Gather Variations

A leading researcher in the concept of the stakeholder, R. Edward Freeman, defines the stakeholder as an individual or group that has some share or interest in the functioning of the business system (1984). 7  Freeman explains that the term stakeholder is preferred over terms such as constituents or influencers because it connotes a level of accountability to the stakeholder by the business entity or initiative. The stakeholder can be as dynamic as the business system: depending on the issue, the stakeholder's level of interest, influence, and perspective may change. Each state team was, therefore, asked to identify the appropriate stakeholders for its project. RTI provided state teams minimal direction for identifying the stakeholders, except to request that the greatest effort be made to identify and include as many stakeholders as possible (for the list of recommended stakeholders to include in state work groups, see Appendix C).

The first step in developing an effective outreach strategy for stakeholders was for the state teams to create as comprehensive a list of stakeholders as possible on the basis of the privacy and security domains. By developing an initial list, the states were able to "piggyback" on that list and add more stakeholders as needed. Another phenomenon of the stakeholder concept is that various program levels spur various stakeholders. For example, at the administrative or management level, stakeholders may be different from those who will interface with the project on the operations level. Most state teams addressed these nuances as they worked with their stakeholder groups by soliciting information from the appropriate participant level within them.

All of the state teams relied on a top-down approach in their outreach strategies. Once they agreed on a stakeholder, the initial contact was at the highest level to solicit participation and input from the organization or entity. The thought was that, for the type of detail required, participants needed to understand that their leadership supported their participation. Information was then sent either to the initial contact person or an in-person contact was made to introduce the project. During the initial contact the state teams also detailed the expectations for participating in the work groups.

Once the states were provided the scenarios, the state teams revisited the lists of stakeholders and began placing the stakeholders into work groups. The stakeholder work groups reviewed and analyzed scenarios relevant to their roles and concerns. Although the state teams differed in how the work groups were formed or how data were collected, the level of effort expended to identify and reach stakeholders did not differ at all.

2.1.4 Outreach Methods

To enhance outreach, the state teams

2.1.5 List of Stakeholders

An integral part of this methodology included gathering information from individuals that were part of the wider stakeholder community to determine how widespread the variation was from organization to organization. Anecdotal information indicated not only that the variation between privacy policy and security practices between similar entities posed a problem to engaging in electronic exchange, but also that different stakeholder groups had potentially competing interests. A common example given indicated that while consumers felt that their information should be subject to very stringent privacy guidelines even for purposes of treatment, physicians felt strongly that they would not be able to provide quality care if their access was too tightly regulated.

Table 2-3 provides the raw numbers of stakeholders engaged during the assessment of variation process, as reported by all 34 state teams. This table gives an idea of the scope of stakeholder input that is included in the variation information provided below.

Table 2-3. Number of Stakeholders Engaged in Assessment of Variation Process (All States Combined)
Stakeholder Group Stakeholders Engaged in Variations
Assessment through Community Outreach (Raw Numbers)
(N = 34) (Avg.)
Providers 1,630 (48)
Hospitals/health systems 341 (10)
Clinicians 240 (7)
Physicians and physicians groups 220 (6)
Community clinics and health centers 185 (5)
Professional associations and societies 157 (5)
Pharmacies/pharmacy benefit managers 85 (3)
Mental health and behavioral health 82 (2)
Long-term care facilities and nursing homes 74 (2)
Safety net providers 61 (2)
Homecare and hospice 44 (1)
Laboratories 43 (1)
Emergency medicine 42 (1)
Federal health facilities 37 (1)
Other health care providers 19 (1)
Technology and health information experts 582 (17)
Privacy and security experts/compliance officers 141 (4)
Electronic health records experts 94 (3)
Health IT consultants 84 (2)
Quality improvement organizations 67 (2)
Technology organizations/vendors 58 (2)
Health information management organizations 56 (2)
Regional health information organizations 47 (1)
Other health data and technology experts 35 (1)
Consumers 458 (13)
Individual consumers 318 (9)
Consumer organizations and advocates 140 (4)
Other government 243 (7)
Medicaid/other state government 193 (6)
County government 50 (1)
Public health agencies or departments 213 (6)
Employers 198 (6)
Legal counsel/attorneys 181 (5)
Medical and public health schools/research 140 (4)
Payers 122 (4)
Law enforcement and correctional facilities 37 (1)
Foundations/other policy consultants 4 (<1)
Other 3 (<1)
Total 3,811 (112)

2.1.6 Approaches to Conducting the Work

Plan

In June and July 2006, RTI conducted a series of web-based conference calls and in-person trainings to introduce the state project teams to the project tools that had been developed, including the 18 scenarios and the Agency for Healthcare Research and Quality (AHRQ) National Resource Center portal, and, on the basis of these tools, to suggest an approach to the work. This approach consisted of 4 main steps through the submission of the Interim Assessment of Variation (IAV) report. Although this process is delineated here as a sequence of separate steps, it is actually a dynamic and interactive iterative process; most state teams managed the process by having considerable overlap in the composition of their work groups.

Step 1. The VWG members reviewed as many of the 18 health information exchange (HIE) scenarios as their knowledge and experience allowed in order to generate a core set of business practices and policies consistent with the stakeholder roles represented in the scenarios. VWG members could also at this stage begin to identify business practices for which policy decisions may be needed to transition from a paper-based system to electronic health information exchange. As part of this initial step, project teams were asked to categorize business practices as potential barriers to electronic health information exchange; as potential enablers of or aids to electronic health information exchange; or as having no impact on the flow of information, whether on paper or electronically.

In this scheme, the term barrier was initially defined as any business practice that impeded or blocked the electronic flow of information; it was intended to flag any business practice for which an understanding of the underlying rationale (ie, the policy or legal driver) would be required to guide decisions about whether the practice was necessary. If the practice was deemed necessary, this understanding would also guide reconciliation of the practice with the need to exchange the information electronically. Similarly, the category of aid to electronic health information exchange was to flag practices for review as potentially good practices that could be shared with other organizations and states.

The RTI project team including the RTI Technical Advisory Panel (TAP), and the state teams wrestled with the term barrier as applied to individual practices because of its negative connotations. The project focus is on the variation in practice, policy, and law that poses a barrier to interoperable electronic health information exchange, not on individual practices that may or may not be barriers to interoperable electronic health information exchange. The definition was refined in an attempt to remove the value judgment and was then presented as "a practice, policy, or law that impedes, prohibits, or imposes conditions on health information exchange." States were asked not to make a decision at this point in the process about whether a practice categorized as a barrier was "an appropriate protection" or an overly restrictive practice that could be modified; instead, they were asked to flag practices for further scrutiny.

Although many state teams followed this approach, a number of state teams took the position that, under this definition, informed consent would be a barrier and, even though it could be called an appropriate protection or a good barrier, the label barrier would, nonetheless, be a bad fit in this context. The RTI project team ultimately decided that states could use their own method of flagging the business practices for further evaluation and consideration by their work groups. This report contains many references to barriers; they are derived from the text provided by the state reports and the definition provided here.

Step 2. The scenarios and core set of business practices generated by the VWG were circulated to a broad group of stakeholders to develop additional business practices based on their experience. This step served to involve the community, build consensus, fill gaps in the VWG membership, and check the accuracy of the practices generated by the VWG.

On the basis of the American Health Information Management Association's (AHIMA) experience during development and pilot testing of the scenarios, the RTI project team suggested that this step might be most effectively accomplished through a series of facilitated meetings, but recognized that such meetings would not be feasible for all state teams. AHIMA and the RTI project team prepared a guide to facilitating these meetings, which was included in the Manual of Operations. To ensure efficiency during use of the facilitated-meeting model, meetings were organized around subsets of the 18 scenarios, and the relevant stakeholders were invited to attend each meeting. State teams submitted plans describing their preferred methods for organizing the stakeholder groups.

Step 3. The VWG reviewed the full set of collected business practices to ensure that the data were complete and sufficiently detailed for use by the LWG; in addition, the VWG was charged with identifying those business practices for which policy decisions might be needed.

Step 4. To identify and capture any legal drivers that might be relevant, the LWG reviewed the collected business practices that the VWG flagged.

Each state team was granted considerable latitude to determine, given its own circumstances, the specific approach that would work best for it. In particular, state teams determined the best methods for engaging a broad group of stakeholders in the review of scenarios.

Outcomes

The VWGs' task was to review the scenarios, generate a core set of business practices, and begin to identify challenges to interoperable electronic health information exchange. VWGs achieved broad coverage of stakeholder groups and state regions. To increase coverage of stakeholder perspectives, some states expanded the VWG to include additional individuals from participating organizations.

The function of the VWG varied across teams. Most collected a core set of business practices as suggested. Others generated the initial set of business practices in meetings that combined the VWG with the broader group of stakeholders. A few asked stakeholders to generate the initial set of business practices, which the VWG then reviewed and completed. Before collecting business practices, some VWGs identified interoperability challenges based on their perceptions of the scenarios. Shortly after receiving the scenarios, one state team generated a core set of questions or topic areas for each scenario to guide stakeholder discussion. These questions were shared with RTI, AHRQ, the Office of the National Coordinator for Health Information Technology (ONC), and selected TAP members for review and comment. It was then distributed to all project teams as a scenario guide.

The practices collected were shared with a broader group of stakeholders to validate that, as a set, they were reasonably complete and to fill gaps as necessary. All teams engaged the broader stakeholder community; 30 to approximately 300 stakeholders participated. Most teams used facilitated meetings, but also employed additional techniques to collect supplementary data from stakeholders. Additional stakeholder input was collected by telephone and in-person interviews, conference calls, e-mail, submissions to websites, and submittal of completed worksheets.

Stakeholders were usually asked to review and vet the core set of business practices generated by the VWG. A number of reports noted that they also sent background materials, scenarios, and the core set of business practices to stakeholders in advance of the meeting.

A few teams noted that they added scenarios or modified the provided scenarios to adapt them to particular circumstances in their respective states or territory.

Most project teams arranged meetings organized by subsets of scenarios that required input from a common set of stakeholder groups. Usually 2 to 5 scenarios were reviewed per meeting. This approach also allowed teams to limit participation to a manageable size to encourage active participation. Most teams reported that 2 to 3 members of the core team attended the stakeholder meetings to provide background, facilitate, and take notes.

Six state teams reported that they encountered concerns from stakeholders about confidentiality and anonymity in the discussions. Three teams reported that they developed a confidentiality agreement to address these concerns. One state team reported that stakeholder participation was limited because some recruits were prohibited from sharing their practices, citing proprietary business practice information. A few states reported participants who were unwilling to share business practices despite assurances of confidentiality and anonymous reporting.

Some teams noted an inability to engage particular stakeholder groups, such as consumers, law enforcement, and federal health facilities, in this phase of the work. These project teams reported continuing efforts to engage these stakeholder groups so they would be able to include their input in the final Assessment of Variation and Analysis of Solutions reports.

All teams made a conscious effort to assess the completeness of the coverage they had achieved between their VWG membership and the stakeholders they were able to engage. They solicited additional input through targeted recruitment as necessary to fill gaps. Many state teams reported that they cycled back to collect additional information as necessary to ensure that their information was sufficiently specific and complete. State teams also reported that they had distributed the larger, final set of business practices to the entire group of participants as a final quality control check on the accuracy of note-taking and data entry.

All state teams mapped legal drivers to business practices, although in some instances the work was not finished at the time of report submission. Rather than wait to receive business practice data, at least 12 LWGs chose, on the basis of their review of each scenario, to compile compendiums of relevant law. This method proved efficient, allowing LWGs to map legal drivers to business practices as soon as business practices became available.

Representativeness of Business Practices

In designing the process for assessing variation in business practices related to the privacy and security of health information exchange, the project team faced the major challenge of ensuring that the business practices identified by the states were comprehensive and represented the broad range of entities that might participate in HIEs. Stakeholder groups are numerous and often have many constituents within each group (eg, providers). Seventeen groups were named in the request for proposals sent to each of the states and territories, with the option of identifying additional stakeholders (for a complete list of stakeholders, see Appendix C). Statistical sampling methods would have provided a quantitative approach to the information collection, but the process of engaging stakeholders and building relationships among organizations at the community level would have been compromised. Instead we opted for a microiterative approach.

First, the scenarios were developed to represent a wide range of stakeholders, as well as an array of contexts for HIE. Second, each participating state and territory was specifically required to demonstrate the capability to ensure participation by a wide range of stakeholders collectively representing the state's current environmental landscape, both within the stakeholder communities and geographically across each state. Third, the importance of engaging a broad coalition of stakeholder organizations was also covered during the training of each of the state teams to ensure that, as a practical matter, appropriate groups would participate in each state. Fourth, the design of the assessment process relies on a recursive approach, one in which practices identified by the VWG are vetted with larger groups of stakeholders at several points in the assessment process to identify and fill gaps.

2.2 Treatment (Scenarios 1–4)

1. Patient Care Scenario A

Patient X presents to emergency room of General Hospital in State A. She has been in a serious car accident. The patient is an 89-year-old widow who appears very confused. Law enforcement personnel in the emergency room investigating the accident indicate that the patient was driving. The patient may be impaired because of medications; that possibility is being investigated as well. Her adult daughter informed the ER staff that her mother was recently treated at a hospital in a neighboring state and has a prescription for an antipsychotic drug. The emergency room physician determines the need to obtain information about patient X's prior diagnosis and treatment during the previous inpatient stay.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:
  1. Determining status of the patient and chain of responsibility.
  2. Practice and policy for obtaining information sufficient for treatment.
  3. Practice and policy for handling mental health information.
  4. Practice and policy for securing the data exchange mechanism.
  5. Practice and policy related to authentication of requesting facility by the releasing facility.
  6. Practice and policy related to patient authorization for the release of information.
2. Patient Care Scenario B

An inpatient specialty substance abuse treatment facility intends to refer client X to a primary care facility for a suspected medical problem. The 2 organizations do not have a previous relationship. The client has a long history of using various drugs and alcohol that is relevant for medical diagnosis. The primary care provider has requested that the substance abuse information be sent by the treatment facility. The primary care provider intends to refer the patient to a specialist and plans to send all of the patient's medical information, including the substance abuse information that was received from the substance abuse treatment facility, to the specialist.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. How does the releasing organization obtain authorization from the patient to allow release of medical records?
  2. What is the process for handling substance abuse medical records data?
  3. How does the releasing organization authenticate the health care provider requesting the information?
  4. How is the data exchange secured?
3. Patient Care Scenario C

At 5:30 p.m., Dr. X, a psychiatrist, arrives at the skilled nursing facility to evaluate his patient, recently discharged from the hospital psychiatric unit to the skilled nursing facility. The hospital and skilled nursing facility are separate entities and do not share electronic record systems. At the time of the patient's transfer, the discharge summary and other pertinent records and forms were electronically transmitted to the skilled nursing home.

When Dr. X enters the facility, he seeks assistance locating his patient, gaining entrance to the locked psychiatric unit, and accessing the patient's electronic health record to review the discharge summary, I&O, MAR, and progress notes. Dr. X was able to enter the unit by showing a picture identification badge, but was not able to access the electronic health record (EHR). As it is Dr. X's first visit, he has no log-in or password to use their system.

Dr. X completes his visit and prepares to complete his documentation for the nursing home. Unable to access the skilled nursing facility EHR, Dr. X dictates his initial assessment via telephone to his outsourced, offshore transcription service. The assessment is transcribed and posted to a secure Web portal.

The next morning, from his home computer, Dr. X checks his e-mail and receives notification that the assessment is available. Dr. X logs into his office Web portal, reviews the assessment, and applies his electronic signature.

Later that day, Dr. X's office manager downloads this assessment from the Web portal, saves the document in the patient's record in his office, and forwards the now encrypted document to the long-term care facility via e-mail.

The skilled nursing facility notifies Dr. X's office that they are unable to open the encrypted document because they do not have the encryption key.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Agreements for data sharing—business associate agreements.
  2. Setting out access and role management policies and practices for temporary or new access.
  3. Determining appropriate access to mental health records.
  4. Securing unstructured, possibly nonelectronic patient data.
  5. Reliability of other entity security and privacy infrastructure.
4. Patient Care Scenario D

Patient X is HIV positive and is having a complete physical and an outpatient mammogram done in the Women's Imaging Center of General Hospital in State A. She had her last physical and mammogram in an outpatient clinic in a neighboring state. Her physician in State A is requesting a copy of her complete records and the radiologist at General Hospital would like to review the digital images of the mammogram performed at the outpatient clinic in State B for comparison purposes. She also is having a test for the BrCa gene and is requesting the genetic test results of her deceased aunt who had a history of breast cancer.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Authenticating entities and individuals.
  2. Determining processes and laws for release of genetic and HIV information.

2.2.1 Stakeholders

For Scenarios 1 through 4, RTI suggested that hospitals, substance abuse treatment facilities, physicians, public health agencies, patient-consumers, and community clinics and health centers be included as the stakeholder groups engaged in the review of the scenarios and asked to describe business practices.

All stakeholder groups were engaged in the review of Scenarios 1 through 4, although participation among the groups was not uniform across the states. The frequency with which each of the stakeholder groups was engaged in the review and discussion is shown in Table 2-4. The most frequently engaged stakeholder groups were hospitals, engaged by all the state teams; physician groups (91%); clinicians (88%); long-term care facilities (59%); community clinics (53%); and consumers and consumer groups (50%).

Table 2-4. Stakeholder Groups Engaged in Scenario 1–4 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder Group
in Review of Scenarios 1–4
(N = 34) (%)
Hospital personnel/emergency room staff 34 (100%)
Physician groups 31 (91%)
Clinicians 30 (88%)
Long-term care facilities 20 (59%)
Public health agencies 19 (56%)
Community clinics 18 (53%)
Consumers/consumer groups 17 (50%)
Behavioral health 13 (38%)
State government 11 (32%)
Nursing homes 10 (29%)
Payers 9 (26%)
Federal health facilities 8 (24%)
Correctional facilities personnel 7 (21%)
Homecare and hospice 6 (18%)
Laboratories 6 (18%)
Pharmaceutical companies 6 (18%)
Professional associations 6 (18%)
Schools 6 (18%)
Health information management/transcription 5 (15%)
Quality improvement organizations 5 (15%)
Attorneys 5 (15%)
Law enforcement 3 (9%)

2.2.2 Domains

Table 2-5 shows the domains of privacy and security affected by business practices reported for each state team. Domains examined across the state teams showed little variation, with more than half of the state teams addressing 8 or 9 of the domains. The top 4 domain areas were

Table 2-5. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 1–4 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X X X X X X X X
Arizona X X X X   X X X X
Arkansas X X X X     X X X
California X X       X   X X
Colorado X X X X X X X   X
Connecticut X X X X X X X X X
Florida X X X X     X X X
Illinois X X X X X X X   X
Indiana   X   X X X     X
Iowa X X X X X X X X X
Kansas X X X X X X X X X
Kentucky X X   X   X X X X
Louisiana X X   X X X X X X
Maine X X X X X X X X X
Massachusetts X X X X X   X X X
Michigan X X X X X X X X X
Minnesota X X X X X X X X X
Mississippi X X X X         X
New Hampshire                 X
New Jersey X X   X     X X X
New Mexico X X X X X X X X X
New York X X X X X   X X X
North Carolina X X X X X X X X X
Ohio X X              
Oklahoma X X X X X X X X X
Oregon X X X X     X X X
Puerto Rico X X X X X X X X X
Rhode Island   X   X X     X X
Utah X X   X X   X X X
Vermont X X X X X X X   X
Washington X X X X X X X X X
West Virginia X X X X X X X X X
Wisconsin X X X X X X X X X
Wyoming X X X X         X
Total 31
(91%)
33
(97%)
25
(74%)
31
(91%)
22
(65%)
22
(65%)
26
(76%)
27
(79%)
33
(97%)

2.2.3 Critical Observations

Critical observations related to the treatment scenarios were fairly uniform, although numerous variations were described in the management and transmission of health information. In many states, paper-based records are still the norm, and patient information is exchanged informally, most often verbally and by fax. In many circumstances, voice recognition, caller-ID, or requests received on letterhead were cited as the means for authenticating the individuals receiving the personal health information. In this context, privacy and security policies were unevenly implemented in practice. Stakeholders tended to rely heavily on already established relationships when they exchanged information, with voice recognition alone serving to authenticate the person receiving the information. For organizations that used an electronic health record (EHR), significantly more procedures were in place to protect patient information, including training, signed confidentiality statements, and access controls. Stakeholders experienced in electronic health information exchange indicated that most EHR systems did not include functionality for segregating specially protected health information. While most stakeholders respected the need for policies and procedures to protect personal health information, they also expressed a tension between having access to appropriate health information available to providers at the time it is needed, and having security policies and practices that make that access useable while respecting the patient's privacy. Many stakeholders who were private-practice physicians or part of a small group practice felt that the prohibitive cost of EHR systems that provided adequate levels of security was a significant barrier to electronic health information exchange.

In nearly all states, additional protections and restrictions were placed on special categories of specially protected information, including drug and alcohol diagnoses and treatment, mental health information, HIV/AIDS diagnoses, and genetic information. Some states mentioned business practices they used that provided a work-around to sharing such information when necessary (such as dictating the information into the patient record). Many states indicated that while sexual health information is not part of the legally protected category, with the exception of HIV/AIDS status, most providers attach additional protections to sharing such information in light of protecting their patients' privacy. A few states indicated that 42 C.F.R. pt. 2 provides a higher degree of protection for behavioral health information than the HIPAA Privacy Rule.

The Privacy Rule requires that covered entities make reasonable efforts to use and release only the minimum necessary protected health information to achieve the intended purpose. The state teams reported widespread variation, however, in how the minimum necessary standard is interpreted and applied. The state teams reported no clear definition of minimum necessary in any given situation. The level of information provided to satisfy this standard varies not only from organization to organization, but also among people within the same organization. Many states suggested that, because the standard is a reasonableness standard and is variable and flexible, it lends itself to multiple interpretations that create variability, which, in turn, poses a challenge to electronic health information exchange. In addition, there is misunderstanding of when and how to apply the standard that also adds to the variable application.

Analysis of Scenario 2 also illustrated that many providers are reluctant to share health information and will request consent even in routine treatment circumstances. With respect to the Privacy Rule, "consent" for the release of health information (which is permitted, but not required, for treatment payment and health care operations) is often confused by stakeholders with authorization, which is often required to exchange health information for other purposes. 8  More frequently, it is state law or organizational policy that requires consent for treatment.

Even though obtaining patient consent is a widespread practice across providers in most states, the policies and procedures for obtaining consent vary considerably, as do working definitions of the term consent.

Many stakeholders do not fully understand the interstate exchange of health information and the request for health information for out-of-state patients. The state teams identified broad variation in practices followed to exchange health information, including variation in data definitions, transmission protocols, and authentication protocols. Definitions of key data elements describing procedures, treatments, and patient characteristics are inconsistent across entities, compromising the comparability of health information maintained by different providers. In addition, both paper-based and electronic information systems employ a wide range of incompatible practices that can lead to misinterpretation by users outside of the originating systems. Differing legal definitions used in licensing health professionals provide an additional degree of complication when examining interstate health information sharing.

Lack of a consistent, accurate method for tracking individuals and linking their multiple disparate patient records presents a challenge whenever health information is shared across organizational boundaries. Various algorithms provide a relatively high level of matching given a few pieces of personal information, although no algorithm-based system can assure 100% accurate matching. The reverse situation, where more than one individual's health information is contained in one record, is commonplace in states with large numbers of uninsured and possibly illegal aliens.

2.3 Payment (Scenario 5)

5. Payment Scenario

X Health Payer (third party, disability insurance, employee assistance programs) provides health insurance coverage to many subscribers in the region the health care provider serves. As part of the insurance coverage, the health plan case managers must approve/authorize all inpatient encounters. This requires access to patient health information (eg, emergency department records, clinic notes).

The health care provider has recently implemented an EHR system. All patient information is now maintained in the EHR and is accessible to users who have been granted access through an approval process. Access to the EHR has been restricted to the health care provider's workforce members and medical staff members and their office staff.

X Health Payer is requesting access to the EHR for their accredited case management staff to approve/authorize inpatient encounters.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Get patient authorization to allow payer access.
  2. Facility needs to determine the minimum necessary and limit to pertinent time frame.
  3. If allowed, access and role management are issues.
  4. Determine method for enabling secure remote access if allowed.

2.3.1 Stakeholders

Overall, the state teams included a wide variety of stakeholders in discussions for Scenario 5. While some states were able to draw from a large pool of stakeholders, other states were able to include only a few stakeholders for this scenario. Although stakeholder variation among states was great, 2 of the stakeholder groups that would be most directly affected by this scenario were well represented: 31 of the 34 state teams included a payer stakeholder in discussions, and 28 of the 34 included hospital personnel (Table 2-6). In contrast, consumers, another stakeholder group highly likely to be affected by this scenario, were represented in only 14 states. Other common stakeholder groups were state government, clinicians, physician groups, and homecare/hospice, each represented in 11 to 12 states.

Table 2-6. Stakeholder Groups Engaged in Scenario 5 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder Group in Review of Scenario 5
(N = 34) (%)
Payers/insurance 31 (91%)
Hospital personnel/emergency room staff 28 (82%)
Consumers/consumer organizations 14 (41%)
State government 12 (35%)
Clinicians 11 (32%)
Physician groups 11 (32%)
Homecare and hospice 11 (32%)
Community clinics and health centers 9 (26%)
Federal health facilities 9 (26%)
Long-term care facilities/nursing homes 7 (21%)
Public health agencies 7 (18%)
Professional associations 7 (18%)
Pharmacies 5 (15%)
Information security 3 (9%)
Quality improvement organizations 3 (9%)
Medical and public health schools that undertake research 3 (9%)
Laboratories 2 (6%)
Correctional facilities personnel 2 (6%)
Health IT personnel 2 (6%)
Regional health information organization (RHIO) representatives 1 (3%)
County government 1 (3%)
Substance abuse centers 1 (3%)

2.3.2 Domains

The state teams varied widely in their views about Scenario 5: some thought that all 9 domains were relevant to this scenario and others felt that this scenario involved only 1 or 2 domains. Despite this variation, 29 of the 34 of the state teams reported that Domain 2—Information authorization and access control to allow access only to people or software programs that have been granted access rights to electronic personal health information—was related to this scenario.

To ensure that users have access only to appropriate information, state teams use procedures such as log-in names and passwords to help identify the user and role-based access. Some state teams found that nonexistent access control procedures in partner organizations were a barrier to electronic health information exchange. Additionally, some state teams found that hospital systems and payers do not use a standardized protocol for role-based access beyond their own facility and, therefore, cannot distinguish whether users from other facilities have permission to access treatment data, specially protected data, or more general data. A related issue was the lack of access to organizations' electronic systems by third-party administrators. Most organizations do not allow any kind of remote access to their systems by outside parties.

Twenty-six of the 34 state teams listed Domain 9—"Information use and disclosure policies that arise as health care entities share clinical information electronically"—as valid for this scenario (Table 2-7). State teams found that many health care providers have no written policies to address this issue. They agreed that patients authorize release for payment purposes (not for access to medical records), that patient consent is required by the payer before any disclosure, and that payers should have access to only minimum necessary patient information.

Table 2-7. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 5 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X X X X X X X X
Arizona X X X X   X X X X
Arkansas X X X X X       X
California   X       X X   X
Colorado   X         X   X
Connecticut X X X X X X X X X
Florida   X           X X
Illinois X X           X  
Indiana   X     X        
Iowa   X X X X X X   X
Kansas X X X X X X X X X
Kentucky X X   X X X X X X
Louisiana X X X     X X    
Maine X X       X      
Massachusetts               X X
Michigan X X X X X X     X
Minnesota X X     X X X X X
Mississippi   X   X   X     X
New Hampshire                 X
New Jersey X X   X       X  
New Mexico   X           X  
New York X X         X    
North Carolina X X X X   X     X
Ohio   X             X
Oklahoma X X X X X   X X X
Oregon X         X X   X
Puerto Rico X X X X X X X X X
Rhode Island   X             X
Utah   X             X
Vermont   X   X   X     X
Washington X X X X X X X   X
West Virginia X   X X       X  
Wisconsin X X   X X     X X
Wyoming X               X
Total 21
(62%)
29
(85%)
13
(38%)
17
(50%)
13
(38%)
17
(50%)
15
(44%)
15
(44%)
26
(76%)

Domain 1—"User and entity authentication is used to verify that a person or entity seeking access to electronic personal health information is who they claim to be" was the third most common domain cited by the state teams for the payer scenario. Of the 34 states, 21 felt this domain was relevant to Scenario 5. Currently, most providers ask for a written request from the insurance company or use a call-back procedure to authenticate the identity of the requestor if they are not in regular contact with the person calling.

2.3.3 Critical Observations

A common theme among the states was the issue of access to electronic data by outside entities, specifically payers. The state teams reported that hospitals currently do not allow third-party payers access to their EHR, and access by nonhospital personnel is generally restricted and often limited to hard copies of medical records. Payer stakeholders agreed that if they did not already have the information they were seeking through their own claims data, they would request the additional information using a paper-based procedure for release of information.

While the states agree that disclosures relating to payments do not require consent or authorization under the HIPAA Privacy Rule, states and providers express confusion about the amount of patient information required to meet the minimum necessary requirement of the Privacy Rule. States reported that what constitutes the minimum necessary information seemed to vary among organizations, as well as within the same organization. They were also concerned about the ability to segregate information in an EHR to meet the minimum necessary requirements. States that are unable to segregate the data feel that they would be stuck in an "all or nothing" situation when sharing data and would not share any data electronically for fear of improperly disclosing information. The issue of granting access in a HIPAA-compliant manner was a concern commonly reported by the state teams.

Patient consent was another issue discussed in many state team reports. Most states agreed that when a patient signs a release form, it is for permission to release only that information necessary for payment purposes and not for the payer's access to his or her entire medical record. The state team reports indicate wide variation among organizations in deciding when patient consent is required; how the consent is obtained and documented; and how patient consent is communicated to health care organizations, payers, and other outside entities.

In their discussions of the domains of authorization and access controls, the state teams reported that providers use means such as log-in names and passwords to limit access to electronic information. Most stakeholders agreed that only approved users with current business associate agreements (BAAs), contracts, or some other type of legal agreement with the provider would be allowed access to the EHR. Access to the EHR would be time-sensitive, with information specific to the current admission. Additionally, role-based access helps ensure users have access only to the information that they need, not the entire EHR. However, many hospitals have role-based access criteria only for their own facility, which is often not compatible with other facilities. Common criteria must be established for this security measure to be effective in controlling access by outside parties. Time and effort must be spent in developing an electronic system that will restrict access where necessary instead of allowing complete EHR access to all users. Additionally, a database of approved users and executed agreements would need to be maintained and constantly updated to reflect changes in the status of users. State teams that addressed this issue found that providers were currently unwilling to spend the time and money necessary to make these provisions.

Another common theme is the issue of trust. While consumers would like to have their health records available electronically, they have also expressed a general concern about who can access their health information and for what purposes. In essence, they would like for their information to be easily accessible, but at the same time be completely private and secure. Many consumers would also like control over who has access to their medical records. Patients do not trust payers and employers to refrain from using their EHR in an improper way if they have access to it. In addition, some patients are concerned that the release of records containing information related to drug abuse, mental health, alcoholism, or HIV/AIDS may cause substantive harm to individuals and families.

Providers also distrust EHRs; they are concerned the information will be used against them in setting rates. Providers do not trust that others who participate in electronic health information exchange will protect health information to the same degree that they themselves do, thereby exposing them to potential liability. Additionally, providers have a certain level of discomfort in allowing payers to have broad access to EHRs; they are concerned that payers might access EHRs that are not relevant to the patient being treated.

Technology-based solutions, such as restricting access to relevant records only, maintaining a log of payer activities, and providing read-only access to combat the possibility of a payer improperly modifying a record, will help to alleviate concerns. Otherwise, this lack of trust might lead to organizations' and individuals' refusals to participate in an HIE if it becomes available. Substantively addressing these concerns, as well as educating both the public and providers about security policies and measures, will be crucial to achieving widespread participation in electronic health information exchange.

Related to the issue of distrust of EHRs is the cultural issue of comfort with paper systems. Many providers reported that they have used the paper system, including the use of phone and fax, for years and were uncomfortable using new and unfamiliar technologies. However, the providers do recognize that an EHR would be more efficient, allow for a more complete patient history from a variety of sources, and can be more secure than paper records if security is correctly applied. Payers and providers both admitted to a sense of uncertainty about who actually sees a record when it is faxed.

2.4 Regional Health Information Organization (RHIO; Scenario 6)

6. RHIO Scenario

The RHIO in your region wants to access patient-identifiable data from all participating organizations (and their patients) to monitor the incidence and management of diabetic patients. The RHIO also intends to monitor participating providers to rank them for the provision of preventive services to their diabetic patients.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Decision to utilize medical record data to monitor disease management.

  2. Authorization from patients to allow RHIO to monitor their PHI for disease management.

  3. Determine mode of transferring information and type of information, ie, identifiable or de-identified information to the RHIO.

2.4.1 Stakeholders

Scenario 6 was included to provide a context for discussions in states that currently have HIE activity. The generic term RHIO, or regional health information organization, was used in this scenario to describe an HIE. However, no definition of the term RHIO was provided, leaving it open to the state teams to define as needed. While some states have one or more RHIOs, other states have organizations that only participate in HIE at a local level. During the discussions that follow, an HIE of any kind is referred to as a RHIO.

A total of 6 state teams offered no responses for this scenario because their states currently have no RHIOs in operation. As shown in Table 2-8, the 28 state teams that responded to this scenario included a wide variety of stakeholders in discussions. Because of this diversity, the most common stakeholder, hospitals, appeared in only 17 of the 28 responding states. Other common stakeholders, represented in between 10 to 12 states, were payers, public health agencies, physicians groups, clinicians, professional associations, and community clinics and health centers.

Table 2-8. Stakeholder Groups Engaged in Scenario 6 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder
Group in Review of Scenario 6a
(N = 28) (%)
aSix of the 34 states did not respond to the RHIO scenario.
Hospitals 17 (61%)
Payers 12 (43%)
Public health agencies 12 (43%)
Physician groups 11 (39%)
Clinicians 11 (39%)
Professional associations 11 (39%)
Community clinics and health centers 10 (36%)
Consumers/consumer organizations 9 (32%)
Pharmacies 9 (32%)
Homecare and hospice 8 (29%)
Long-term care facilities/nursing homes 8 (29%)
Federal health facilities 8 (29%)
RHIO representatives 7 (25%)
Laboratories 6 (21%)
State government 6 (21%)
Correctional facilities personnel 5 (18%)
Medical and public health schools that undertake research 5 (18%)
Quality improvement organizations 3 (11%)
Information security 2 (7%)
Health information management 2 (7%)
Data vendors 2 (7%)
Law enforcement 1 (4%)
Mental health 1 (4%)
Attorneys 1 (4%)
County government 1 (4%)
Advocacy groups 1 (4%)

2.4.2 Domains

Two state teams responded to this scenario but did not list any domains related to it, leaving a total of 26 states that selected domains. As with other scenarios, opinions varied widely among the states as to which domains were relevant to this scenario. Limited stakeholder response to this scenario in some states may have had an effect on the domains selected.

Of the 26 states that selected domains for this scenario, 22 listed Domain 9—"Information use and disclosure policies that arise as health care entities share clinical information electronically"—as relevant to this scenario (Table 2-9). States agreed that sharing de-identified data with the RHIO for disease surveillance would not necessarily be a problem, but patient or institutional review board (IRB) approval would be necessary to send identifiable data to the RHIO for research or surveillance purposes. Additionally, hospitals would require a BAA or confidentiality agreement with the RHIO before they send data.

Table 2-9. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 6 (N = 26)*
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.

*In addition to the 6 state teams that did not respond to this scenario, 2 state teams out of the 34 did not list any domains associated with this scenario.
Alaska X   X X         X
Arizona                  
Arkansas                  
California   X             X
Colorado   X X X       X X
Connecticut X X X X X X X X X
Florida               X X
Illinois X X           X  
Indiana       X         X
Iowa   X X X     X X  
Kansas X X X X X X X X X
Kentucky X X   X X X X X X
Louisiana X X   X     X   X
Maine       X         X
Massachusetts       X       X X
Michigan X X             X
Minnesota X X X X X X X X X
Mississippi       X         X
New Hampshire                  
New Jersey                  
New Mexico   X           X  
New York   X             X
North Carolina   X X X X X X   X
Ohio                 X
Oklahoma X X X X X X X X X
Oregon                  
Puerto Rico X X X X X X X X X
Rhode Island                  
Utah                  
Vermont                  
Washington       X     X   X
West Virginia     X         X X
Wisconsin X X   X       X X
Wyoming   X              
Total 11
(42%)
17
(65%)
10
(38%)
17
(65%)
7
(27%)
7
(27%)
10
(38%)
14
(54%)
22
(85%)

Seventeen states selected Domain 2—"Information authorization and access controls to allow access only to people or software programs that have been granted access rights to electronic personal health information"—as relevant to this scenario; 17 states also selected as relevant Domain 4—"Information transmission security or exchange protocols for information that is being exchanged over an electronic communications network." States indicated that proper encryption methods, or use of a secure file transfer protocol (FTP), were needed to transmit data to the RHIO. Additionally, access to personal health information transmitted through a RHIO is usually role-based, with permissions set according to an individual's affiliation with one of the connecting institutions.

2.4.3 Critical Observations

Some states were uncertain about the functions of a RHIO, specifically as they relate to data collection, analysis, and disease management. Several state teams were unsure of a RHIO's legal status in their state, and opinions differed as to whether a RHIO was a HIPAA-covered entity. One state team mentioned the lack of a uniform definition for a RHIO; in addition, a RHIO was not recognized as a specific legal entity in that particular state. The general consensus among provider and hospital stakeholders in states where a RHIO has uncertain status was that they were reluctant to input information into the RHIO if it was not subject to the HIPAA Rules or state regulations.

Although the scenario indicated that the RHIO wanted to "access patient-identifiable data," most states responded that they would share only de-identified data with the RHIO. Patient consent would be required for the RHIO to receive patient-identifiable data. Several state teams mentioned that no current state laws prohibited the use of medical information to monitor disease management if the data are de-identified and the patients are not contacted.

According to states, verification of patient identification across different systems can be an issue. One organization may have more up-to-date or complete demographic information than another organization and, therefore, be able to better identify the correct patient. Currently, each organization—hospital, clinic, physician office, or RHIO—employs its own algorithm and patient-matching methods, resulting in inconsistent patient matching. Compounding the problem is the prohibition of using Social Security numbers in medical records in certain states, making patient matching even more difficult. One state has indicated that its statewide RHIO will host a master patient and provider index, as well as provide a variety of functions and rules for matching records across all providers and locations. These functions will allow the RHIO to support identification of particular populations of individuals as required for disease management, to provide clinical decision supports to providers, and to identify and aggregate data as required for performance monitoring.

State teams agreed that, if information is to be exchanged, whether it is patient-identifying or de-identified, security is very important. To remain compliant with the HIPAA Rules, state teams indicated that they would need a BAA or, in the case of one state, a data subscription agreement (DSA) with the RHIO before sending identifiable data. Data files would have to be sent encrypted or be uploaded to a secure website. The RHIO itself would need to have security measures such as password-protected computers, credentialing and authentication of users, and role-based access in place to keep any data it received secure. Additionally, all partner organizations in the RHIO must have adequate and comparable levels of critical factors such as credentialing and authentication of system users and system security. State teams are concerned that if a minimum standard for system security is not met, a participant with weak security measures could compromise the security of all participants.

Some state teams did not want RHIOs to rank participating providers. Some specific concerns included the following: the ranking of providers would likely jeopardize the neutrality of a RHIO; a RHIO must have broad participation, and providers might not want to participate if they know they are being ranked; providers who participate may be unfairly compensated because of referrals associated with their ranking; and consumers may mistakenly assume that a nonparticipating provider is somehow better than a ranked, participating provider.

Another common theme among the state teams regarding RHIOs was the different level of technical capabilities of organizations (large versus small, urban versus rural), a difference that amounts to a capacity gap for some entities that may participate in those RHIOs. Some providers are not currently participating in RHIOs because they still operate a paper-based medical records system, or they cannot bear the cost of connectivity with the RHIO.

2.5 Research Data Use Scenario (Scenario 7)

7. Research Data Use Scenario

A research project on children younger than age 13 is being conducted in a double-blind study for a new drug for ADD/ADHD. The research is sponsored by a major drug manufacturer conducting a double-blind study approved by the medical center's IRB, where the research investigators are located. The data are collected electronically, and all responses from the subjects are completed electronically on the same centralized and shared database file.

One of the investigators asked the principal investigator if he could use the raw data to extend the patient tracking for an additional 6 months or use the raw data collected for a white paper that was not part of the research protocols final document for his postdoctoral fellow program.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. IRB approval of any significant changes to the research protocol.
  2. Research subjects have signed consents and authorization to participate in the research effort.

2.5.1 Stakeholders

All states included representatives from university research groups, health care providers representing both hospitals and clinics, members of IRBs, and consumer advocates in this discussion. States emphasized the inclusion of stakeholders from medical schools and their hospitals' clinical research staff members. Some states specifically mentioned the inclusion of correctional facilities officials. One state noted that its stakeholders for this scenario included participants in clinical trials, as well as a grants administrator familiar with human subjects research guidelines. A few states included stakeholders from hospice, long-term care, and nursing home facilities (Table 2-10).

Table 2-10. Stakeholder Groups Engaged in Scenario 7 Reviews
Stakeholder Group Number of States Engaging Stakeholder
Review of Scenario 7
(N = 34) (%)
Medical and public health schools that undertake research 23 (67%)
Hospital personnel/ER staff 17 (50%)
Clinicians 15 (44%)
Consumers 14 (41%)
Public health agencies 11 (32%)
IRB members 9 (26%)
Physicians 9 (26%)
State government 8 (24%)
Federal health facilities 4 (12%)
Homecare and hospice 4 (12%)
Community clinics and health centers 3 (9%)
Pharmacies 3 (9%)
Professional associations 3 (9%)
Laboratories 3 (9%)
Payers 3 (9%)
Long-term care facilities/nursing homes 3 (9%)
Information security 1 (3%)
Quality improvement organizations 1 (3%)
Correctional facilities personnel 1 (3%)
Attorney 1 (3%)

2.5.2 Domains

Domains 9 and 2 were the 2 most often cited domains by the states. Eighty-eight percent of the states identified Domain 9—"Information use and disclosure policies that arise as health care entities share clinical information electronically"—as most relevant to the scenario's topic, and these states reported significant disagreement among their stakeholders about limitations of the permitted scope of research under the original IRB approval. In Domain 2, more than half the states focused on its requirement that the patient, or consumer, authorize the researcher to access that patient's data. The other 7 domains were nearly evenly selected by a third or so of the states (Table 2-11).

Table 2-11. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 7 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X X   X   X    
Arizona X X   X X       X
Arkansas   X   X   X X X X
California           X     X
Colorado   X         X   X
Connecticut X X X X X X X    
Florida   X           X X
Illinois                 X
Indiana   X             X
Iowa   X         X   X
Kansas X X   X X X X X X
Kentucky           X X   X
Louisiana   X X   X       X
Maine                 X
Massachusetts               X X
Michigan X X   X X   X X X
Minnesota   X       X X X  
Mississippi         X       X
New Hampshire                 X
New Jersey             X   X
New Mexico   X     X       X
New York   X X         X X
North Carolina X X X X X X X X X
Ohio   X              
Oklahoma X X X X X X X X X
Oregon   X           X X
Puerto Rico X X X X X X X   X
Rhode Island                 X
Utah                 X
Vermont X X   X   X     X
Washington   X X X   X     X
West Virginia   X X         X X
Wisconsin X X X X X       X
Wyoming             X   X
Total 10 23 10 11 12 11 14 11 30

The other 7 were also mentioned in regard to proper data storage and data sharing activities. Stakeholders frequently discussed de-identification procedures, data encryption requirements, and the scope of the requested research protocol, as related to the other domains for user and entity authentication, information authorization and access controls, information transmission security or exchange protocols, and administrative or physical security safeguards.

2.5.3 Critical Observations

State teams held many lively discussions about specific requirements the IRB imposed on the Scenario 7 researcher; nearly all stakeholders reported that the IRB approval process was the most significant discussion point for the provision of data in this scenario. Stakeholder groups in 6 states expressed concerns that participating in a RHIO requires a high level of trust that patient information will be protected. Eight state stakeholder groups discussed ways in which personal health information can be used for quality improvement versus research purposes while meeting HIPAA Privacy Rule restrictions. Stakeholders agreed that identifiable health information can be used for quality improvement, but if the results are to be made publicly available and if the primary purpose for using the data is for generalizable knowledge, patient authorization must be obtained. Regarding physical data security, state teams also noted the difficulty of assessing compliance with confidentiality policies and practices for access and use of data by researchers on personal laptops/computers.

In these groups, questions arose about how systems prevent or detect the unauthorized extraction of a data set from a server. Ten states noted that Privacy Rule–required authorizations for research may expire and that any reuse of data after the authorization expiration may require a new authorization from the patient. While the health care provider, not the researcher, typically recontacts the patient, these state teams suggested that opportunities to expand the initial authorization in consideration of information reuse and electronic information exchanges should be explored to better enable reuse of valuable research data. Lastly, they noted that if research data were de-identified, the Privacy Rule would no longer apply to the de-identified data.

In their critical observations regarding Scenario 7, states generally agreed that even with IRB approval of the revised protocol, their stakeholders would always obtain a new authorization to cover the extended time period or additional data use.

2.6 Law Enforcement (Scenario 8)

8. Scenario for Access by Law Enforcement

An injured 19-year-old college student is brought to the ER following an automobile accident. Standard procedure is to run blood-alcohol and drug screens. The police officer investigating the accident arrives in the ER, claiming that the patient may have caused the accident. The patient's parents arrive shortly afterward. The police officer requests a copy of the blood-alcohol test results, and the parents want to review the ER record and lab results to see if their child tested positive for drugs. These requests to print directly from the electronic health record are made to the ER staff.

The patient is covered under his parents' health and auto insurance policy.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. County contracts with emergency department to perform blood-alcohol test draws.
  2. Printing of additional copies of medical record reports for parents, insurance companies, and police.
  3. Asking patient if it is okay to talk to parents or give information to parents about his condition.
  4. Communicating with primary care provider.

2.6.1 Stakeholders

Overall, the state teams included a wide variety of stakeholders in discussions for Scenario 8. The average number of stakeholder groups with input to the scenario was 3.3. Three states, however, were able to draw from more than 7 different stakeholder groups. Because this scenario had a significant law enforcement component, 61% of the state teams (21 of 34) were able to secure the participation of law enforcement personnel in the discussion of this scenario.

Although the stakeholder variation among state teams was great, 26 of the 34 states included a hospital physician stakeholder in discussions, and 16 of the 34 included clinicians or physicians. These stakeholders, along with consumers who were engaged by 12 of the 34 state teams, are the groups that would be most directly affected by this scenario (Table 2-12).

Table 2-12. Stakeholder Groups Engaged in Scenario 8 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder
Group in Review of Scenario 8
(N = 34) (%)
Hospitals 26 (76%)
Law enforcement 21 (61%)
Physician groups 16 (47%)
Consumers/consumer organizations 12 (35%)
Clinicians 11 (32%)
State government 7 (20%)
Payers/insurance 6 (18%)
Public health agencies 6 (18%)
Laboratories 4 (12%)
Community clinics 4 (12%)
Federal health facilities 3 (9%)
Emergency services 2 (6%)
Long-term care facilities/nursing homes 2 (6%)
Homecare and hospice 1 (3%)
Pharmacies 1 (3%)
Professional associations 1 (3%)

2.6.2 Domains

Wide variation emerged in how the state teams viewed this scenario. Some states felt that all 9 domains were relevant to this scenario, while other states felt that this scenario involved only 1 or 2 domains (Table 2-13).

Table 2-13. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 8 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X   X X        
Arizona                 X
Arkansas   X   X X     X X
California                 X
Colorado                 X
Connecticut X X X X X X X X X
Florida   X       X   X  
Illinois   X              
Indiana               X X
Iowa   X           X X
Kansas   X X X   X     X
Kentucky   X           X X
Louisiana   X         X X X
Maine               X X
Massachusetts                 X
Michigan X X   X   X X   X
Minnesota X X       X X X X
Mississippi                 X
New Hampshire                 X
New Jersey X             X X
New Mexico                 X
New York   X   X   X X   X
North Carolina X X X X X X X X X
Ohio               X X
Oklahoma X X X X X X X X X
Oregon   X           X X
Puerto Rico X X X X X X X X X
Rhode Island                 X
Utah                 X
Vermont X X   X   X   X  
Washington                 X
West Virginia X X X X X X X X X
Wisconsin X X X X   X   X X
Wyoming                 X
Total 11 19 7 12 7 12 9 18 30

Despite this variation among the state teams, 30 of the 34 teams stated that Domain 9—"Information use and disclosure policies that arise as health care entities share clinical information electronically"—was valid for this scenario. Most state teams agreed that hospitals must receive formal service of a subpoena before information can be released to law enforcement. However, several state teams noted that they were aware of variations in responses to law enforcement requests among emergency departments in their states, with some departments more willing than others to release information on the basis of a verbal request rather than a formal subpoena. State teams generally agreed that variations in business practices occur because health care organizations and law enforcement do not seem entirely sure about the law and because interpretation of the HIPAA Privacy Rule varies. At least 5 states expressed a related concern about the inadequacy of confidentiality training.

All state teams agreed that no information would be released to the parents of an adult child. Five state teams noted that hospitals handle the presence of parents of adult children patients in the emergency department in nonstandard and varying ways. Five state teams also noted that some children are legally emancipated before their 18th birthday and have the right to limit access to their personal medical record without parental consent, even if they are insured under their parent's medical insurance policy.

2.6.3 Critical Observations

State teams agreed that this scenario reveals a clear chasm between the medical community and law enforcement, and this chasm severely restricts the exchange of information. Because law enforcement personnel reported that they try to obtain as much information as possible before transporting a person to a hospital, several state teams noted how each group's lack of understanding and their differing roles could impact the treatment of the person detained. Law enforcement considered the delay in transportation a necessary operating procedure because difficulties in collecting information greatly increase once an injured person enters a medical facility.

Another critical observation related to the potential loophole in the privacy of the adult child's health information while he or she is covered by a parent's insurance. Several states noted that a parent's receipt of the explanation of benefits from the insurance agency would likely contain enough information about billing for the health care service to enable parents to learn medical information to which they would not otherwise be entitled. This situation could be viewed as a serious barrier to care if a person opted to forgo care because a related or unrelated third party was responsible for payment.

2.7 Prescription Drug Use (Scenarios 9 and 10)

9. Pharmacy Benefit Scenario A

The Pharmacy Benefit Manager (PBM) has a mail order pharmacy for a hospital that is self-insured and also has a closed formulary. The PBM receives a prescription from Patient X, an employee of the hospital, for the antipsychotic medication Geodon. The PBM's preferred alternatives for antipsychotics are Risperidone (Risperdal), Quetiapine (Seroquel), and Aripiprazole (Abilify). Since Geodon is not on the preferred alternatives list, the PBM sends a request to the prescribing physician to complete a prior authorization in order to fill and pay for the Geodon prescription. The PBM is in a different state than the provider's outpatient clinic.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Patient authorization to share information with the PBM.
  2. Agreements for data sharing—BAAs.
  3. Health care provider must determine minimum necessary access to PHI.
  4. If allowed, role and access management.
  5. Method for enabling secure remote access if allowed.
10. Pharmacy Benefit Scenario B

A PBM (PBM1) has an agreement with Company A to review the companies' employees' prescription drug use and the associated costs of the drugs prescribed. The objective would be to see if PBM1 could save the company money on its prescription drug benefit. Company A is self-insured and, as part of its current benefits package, has prescription drug claims submitted through its current PBM (PBM2). PBM1 has requested that Company A send its electronic claims to them to complete the review.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. BAAs and formal contracts exist between Company A and the PBMs.
  2. The extent and amount of information shared between the various parties would be limited by the minimum necessary guidelines.

2.7.1 Stakeholders

For Scenario 9, RTI suggested that community clinics and health centers, pharmacies, and consumers (patients) should be engaged in the review of the scenario and asked to describe business practices. Additional stakeholder groups that might be able to describe practices associated with the scenario included clinicians, physician groups, and payers.

For Scenario 10, RTI suggested that, at a minimum, pharmacies, consumers (employees), and employers should be engaged in the review, and that clinicians, physician groups, payers, and community clinics and health centers might be able to provide additional insight.

Table 2-14 shows that those suggested stakeholder groups were among the most frequently engaged groups, along with hospitals/health systems and Medicaid/other state government.

Table 2-14. Stakeholder Groups Engaged in Scenario 9 and 10 Reviews
Stakeholder Group Number of States Engaging Stakeholder Group
in Review of Scenarios 9 and 10
(N = 34) (%)
Pharmacies/pharmacy benefit managers 27 (79%)
Payers 20 (59%)
Hospitals/health systems 17 (50%)
Physicians and physicians groups 16 (47%)
Clinicians 15 (44%)
Consumers/consumer advocates 14 (41%)
Community clinics and health centers 12 (35%)
Medicaid/other state government 11 (32%)
Employers 10 (29%)
Public health agencies or departments 6 (18%)
Federal health facilities 5 (15%)
Professional associations and societies 5 (15%)
Medical and public health schools/research 5 (15%)
Homecare and hospice 4 (12%)
Electronic health records experts 4 (12%)
Mental health and behavioral health 3 (9%)
Long-term care facilities and nursing homes 3 (9%)
Privacy and security experts/compliance officers 3 (9%)
Regional health information organizations 2 (6%)
Health information managers 2 (6%)
Health IT consultants 2 (6%)
Other 2 (6%)
Emergency medicine 1 (3%)
Laboratories 1 (3%)
Quality improvement organizations 1 (3%)
County government 1 (3%)
Safety net providers 1 (3%)

Seven states did not report engaging pharmacies or PBMs. Other stakeholders included nurses and academicians.

2.7.2 Domains

Wide variation across states emerged, with 7 states reporting that 8 or 9 domains of privacy and security were affected by business practices, and 8 states reporting that only 1 or 2 domains were affected. The 3 most frequently cited domains were 9—"Information use and disclosure policies" (28 states), 4—"Transmission security" (25 states), and 2—"Authorization and access control" (20 states; see Table 2-15).

Table 2-15. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 9 and 10 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X X X X   X    
Arizona X X X X   X X X X
Arkansas X X X X   X X    
California                 X
Colorado       X         X
Connecticut X X X X X X X X X
Florida       X         X
Illinois X     X     X   X
Indiana     X X       X X
Iowa   X   X     X   X
Kansas X X X X X X X   X
Kentucky X X   X X X X X X
Louisiana                  
Maine       X       X X
Massachusetts   X   X         X
Michigan   X   X         X
Minnesota     X X X X X X  
Mississippi   X   X         X
New Hampshire     X X         X
New Jersey   X   X          
New Mexico X X X X X   X X X
New York   X       X     X
North Carolina   X X X X     X X
Ohio X               X
Oklahoma X X X X X X X X X
Oregon             X X X
Puerto Rico X X X X X X X X X
Rhode Island                 X
Utah             X    
Vermont   X   X         X
Washington X     X     X X X
West Virginia X X         X X X
Wisconsin X X X X   X   X X
Wyoming   X             X
Total 14
(38%)
20
(59%)
13
(38%)
25
(74%)
9
(26%)
10
(29%)
16
(47%)
14
(41%)
28
(82%)

BAAs and minimum necessary were the most common issues raised in discussions of Domain 9—"Information use and disclosure policies." Twenty states reported that data could be exchanged with PBMs if the provisions in the HIPAA Privacy Rule were met; that is, if BAAs were in place and minimum necessary information were disclosed, data could be exchanged without patient authorization. One state explicitly noted that the patient would be informed of this relationship and the potential need for information-sharing at the time of enrollment.

One state reported that the state board has no oversight of PBMs, and suggested that adding this would strengthen their approach to data management. Two states noted that patient authorization would be required before specially protected mental health pharmacy data could be shared. Another state reported that their provider stakeholders believed that patient authorization was required for this data exchange, but their LWG determined that this was not based in state law. Regarding minimum necessary, states generally agreed that the disclosing provider is responsible for ensuring that only the minimum necessary information is disclosed. Four states noted that they would exchange only de-identified data.

Two states reported that most of the information described in these scenarios is being exchanged by fax or telephone and that practices are in place to ensure that these exchanges are secure. These states expressly noted avoidance of e-mail exchange or use of advanced technology to exchange data in these scenarios. Other states have begun to exchange pharmacy data via virtual private network (VPN). They also have some experience with e-prescribing, which introduces complexity because of the need to comply with the special federal regulations governing controlled substances and specially protected data.

Discussions of Domain 2 addressed the BAA as described under Domain 9. States reported that these agreements provided both parties mutual security practice knowledge sufficient to enable the information exchange.

2.7.3 Critical Observations

Critical observations concerning Scenarios 9 and 10 are as follows:

2.8 Health Care Operations and Marketing (Scenarios 11 and 12)

11. Health Care Operations and Marketing Scenario A

ABC Health Care is an integrated health delivery system composed of 10 critical access hospitals and one large tertiary hospital, DEF Medical Center, which has served as the system's primary referral center. Recently, DEF Medical Center has expanded its rehab services and created a state-of-the-art, stand-alone rehab center. Six months into operation, ABC Health Care does not feel that the rehab center is being fully utilized and is questioning the lack of rehab referrals from the critical access hospitals.

ABC Health Care has requested that its critical access hospitals submit monthly reports containing patient-identifiable data to the system six-sigma team to analyze patient encounters and trends for the following rehab diagnoses/procedures:

  • cerebrovascular accident
  • hip fracture
  • total joint replacement
Additionally, ABC Health Care is requesting that this same information, along with individual patient demographic information, be provided to the system marketing department. The marketing department plans to distribute to these individuals a brochure highlighting the new rehab center and the enhanced services available.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Decision to conduct marketing using patient data with their consumers.
  2. Authorization from consumer to allow IHDS to market to themselves.
  3. Determine mode of transferring information and type of identifiable or de-identified, to the marketing department.
12. Health Care Operations and Marketing Scenario B

ABC hospital has approximately 3,600 births per year. The hospital marketing department is requesting identifiable data on all deliveries, including mother's demographic information and birth outcome (to ensure that contact is made only with those deliveries resulting in healthy live births).

The marketing department has explained that they will use the patient information for the following purposes:

  1. To provide information on the hospital's new pediatric wing/services.
  2. To solicit registration for the hospital's parenting classes.
  3. To request donations for construction of the proposed neonatal intensive care unit.
  4. To sell the data to a local diaper company to use in marketing diaper services directly to parents.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Request of patient consent or permission to use and sell identifiable data for marketing purposes.
  2. Decisions to conduct marketing using patient data.
  3. Determining mode of transferring information and type of information, ie, identifiable or de-identified, to the marketing department.

2.8.1 Stakeholders

Scenario 11 engaged stakeholders from hospitals, community clinics, and health centers. The scenario could easily be modified to apply to any provider wishing to market services to a targeted subset of patients. Thus, other relevant stakeholder groups included clinicians, physician groups, federal health facilities, payers, laboratories, pharmacies, long-term care facilities and nursing homes, homecare and hospice, and consumers.

Scenario 12 engaged stakeholders from hospitals, as well as consumers and employers. Also recommended were clinicians, physician groups, federal health facilities, payers, community clinics and health centers, laboratories, pharmacies, long-term care facilities, nursing homes, homecare and hospice, and law enforcement.

Virtually all stakeholder groups were engaged in the review of Scenarios 11 and 12 (Table 2-16). The most frequently engaged stakeholder group was hospitals, engaged by 30 of the 34 states. Clinicians, community clinics, consumers, physician groups, and payers were a distant second tier of stakeholder groups, each engaged in discussions by 9 to 12 states.

Table 2-16. Stakeholder Groups Engaged in Scenario 11 and 12 Review
Stakeholder Group Number of States Engaging Stakeholder
Group in Review of Scenarios 11 and 12
(N = 34) (%)
Hospitals/health systems 30 (88%)
Clinicians 12 (35%)
Community clinics and health centers 11 (32%)
Consumers/consumer advocates 10 (29%)
Physicians and physicians groups 9 (26%)
Payers 9 (26%)
Homecare and hospice 7 (21%)
Medical and public health schools/research 7 (21%)
Public health agencies or departments 7 (21%)
Medicaid/other state government 7 (21%)
Federal health facilities 6 (18%)
Long-term care facilities and nursing homes 5 (15%)
Pharmacies/pharmacy benefit managers 5 (15%)
Professional associations and societies 5 (15%)
Quality improvement organizations 3 (9%)
Employers 3 (9%)
Electronic health records experts 3 (9%)
Laboratories 2 (6%)
Regional health information organizations 2 (6%)
Law enforcement and correctional facilities 2 (6%)
Legal counsel/attorneys 2 (6%)
Health IT consultants 2 (6%)
Mental health and behavioral health 1 (3%)
Safety net providers 1 (3%)
County government 1 (3%)
Health information management organizations 1 (3%)
Privacy and security experts/compliance officers 1 (3%)
Technology organizations/vendors 1 (3%)
Other 1 (3%)

2.8.2 Domains

Wide variation among states emerged regarding domains: 2 states reported that 8 domains of privacy and security were affected, while 17 states reported that only 1 or 2 domains were affected. By far Domain 9—"Information use and disclosure policies" (31 states) was the most frequently cited, followed distantly by Domain 2—"Authorization and access control" (17 states; Table 2-17).

Table 2-17. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 11 and 12 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska   X       X X X X
Arizona   X   X     X   X
Arkansas     X X X   X    
California           X     X
Colorado                 X
Connecticut X X X X X X X   X
Florida   X             X
Illinois       X         X
Indiana   X       X     X
Iowa   X             X
Kansas X X X     X   X X
Kentucky                 X
Louisiana   X       X X   X
Maine             X X X
Massachusetts                 X
Michigan                 X
Minnesota   X       X X X  
Mississippi       X         X
New Hampshire               X X
New Jersey   X   X         X
New Mexico   X X       X X X
New York X X   X   X X   X
North Carolina X X X X   X   X X
Ohio                 X
Oklahoma X X X X X X X   X
Oregon X X   X     X    
Puerto Rico               X X
Rhode Island                 X
Utah                 X
Vermont                 X
Washington   X       X X   X
West Virginia                 X
Wisconsin X X X X   X   X X
Wyoming                 X
Total 7
(21%)
17
(50%)
7
(21%)
11
(32%)
3
(9%)
12
(35%)
12
(35%)
9
(26%)
31
(91%)

Eight states reported variation between organizations about how these exchanges were interpreted. Some stakeholders felt that the exchanges were internal operations exchanges and, as such, were permitted by the HIPAA Privacy Rule and state law. Other stakeholders in these same states were surprised by this view and would not exchange data in the circumstances presented by these scenarios. Many stakeholders were certain that using patient-identified information for marketing purposes was not permitted without patient authorization and would be unethical even if it were permitted. A few states explicitly reported that that they would never sell data for third-party marketing. Two states reported that the exchange of patient data for marketing purposes would be permitted if minimum necessary data were exchanged; one state reported that a BAA would be required between the hospital and the marketing firm.

Three states reported that access would require the involvement of their IRB or privacy officer before access to data for marketing would be allowed. One state reported that existing access controls prohibit access to the data for marketing purposes.

2.8.3 Critical Observations

Responses to Scenario 11 were fairly uniform. This scenario described the internal use of patient data for quality improvement and marketing efforts that amount to the hospital's offering additional services to its existing customers. Most stakeholders felt the quality improvement use could be accomplished with de-identified data and did not present any areas where policy decisions might be needed.

States reduced Scenario 12 to the different information exchanges described. Disclosure to sell patient data to a local diaper service was widely viewed as disallowed either by the individual states or by the HIPAA Privacy Rule. Ten states viewed it as unethical behavior and would not sell such data even if state law allowed it. Three states reported that patient authorization would be required before data could be sold. States agreed that consumers would react negatively if their medical data were sold. This use would create consumer mistrust and concern about unauthorized and unknown access to and use of medical data.

States also agreed that the HIPAA Privacy Rule allows hospitals to provide information about pediatric services and parenting classes and that the Rule requires that patients have the opportunity to opt out of fundraising communications.

2.9 Bioterrorism Event (Scenario 13)

13. Bioterrorism Event

A provider sees a person who has anthrax, as determined through lab tests. The lab submits a report on this case to the local public health department and notifies their organizational patient safety officer. The public health department in the adjacent county has been contacted and has confirmed that it is also seeing anthrax cases and, therefore, this could be a possible bioterrorism event. Further investigation confirms that this is a bioterrorism event, and the state declares an emergency. This then shifts responsibility to a designated state authority to oversee and coordinate a response, and involves alerting law enforcement, hospitals, hazmat teams, and other partners, as well as informing the regional media to alert the public concerning symptoms and seeking treatment if feeling affected. The state also notifies the federal government of the event, and some federal agencies may have direct involvement in the event. All parties may need to be notified of specific identifiable demographic and medical details of each case as it arises to identify the source of the anthrax, locate and prosecute the parties responsible for distributing the anthrax, and protect the public from further infection.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

2.9.1 Stakeholders

Many state teams reported that Scenario 13 was one of the more popular scenarios for discussion. Overall, the state teams were able to include a wide variety of stakeholders in discussions for this scenario (Table 2-18). The average number of stakeholder groups offering input to the scenario discussion was 4. However, 12 states received input from 5 or more stakeholder groups, and 2 states drew from more than 10 stakeholder groups. Given the significant public health component of this scenario, stakeholders from this sector were successfully brought into the discussion by all but a few states. Those states that did not have direct input from the public health sector brought information from state agency and federal agency staff familiar with public health procedures. This scenario, like Scenario 8, had a significant law enforcement component. However, only 10 states reported that they engaged law enforcement stakeholders in discussion for this scenario. As these states noted, increasing discourse with law enforcement is a much-needed step in addressing privacy and security concerns in the context of electronic health information exchange.

Table 2-18. Stakeholder Groups Engaged in Scenario 13 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder
Group in Review of Scenario 13
(N = 34) (%)
Public health agencies 27 (79%)
Physician groups 16 (47%)
Clinicians 16 (47%)
Hospital personnel/emergency room staff 15 (44%)
State government 13 (38%)
Laboratories 11 (32%)
Consumers 10 (29%)
Law enforcement 10 (29%)
Federal health facilities 8 (26%)
Emergency services 5 (15%)
Homecare and hospice 5 (15%)
Payers/insurance 4 (12%)
Community clinics and health centers 4 (12%)
Pharmacies 3 (9%)
Mental health 2 (6%)
Emergency services 2 (6%)
Long-term care facilities/nursing homes 2 (6%)
Medical and public health schools that undertake research 2 (6%)
Professional associations 2 (6%)
Poison control 1 (3%)

Between 15 and 20 states included a hospital physician stakeholder in discussions, and 13 of the 34 included either state or federal agency stakeholder input. Given the media relations component of the scenario and the threat to the public, it is somewhat surprising that only about one third of the states were able to include consumer stakeholders in their discussions.

2.9.2 Domains

Wide variation emerged in how the state teams viewed this scenario (Table 2-19). Five state teams felt that all 9 domains were relevant to this scenario, while 7 other state teams felt that this scenario involved only 1 to 3 domains. The majority of states' business practices fell within 4 to 7 domains.

Table 2-19. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 13 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X   X     X      
Arizona       X     X   X
Arkansas   X   X     X X  
California         X X     X
Colorado   X   X   X X   X
Connecticut X   X X X X X X X
Florida X X   X X X X X X
Illinois X X     X       X
Indiana       X         X
Iowa   X              
Kansas X X X X X   X X X
Kentucky                  
Louisiana X X   X       X X
Maine X               X
Massachusetts                 X
Michigan X     X     X   X
Minnesota X X X X X X X X X
Mississippi       X          
New Hampshire                 X
New Jersey   X   X       X  
New Mexico                  
New York X X X       X X X
North Carolina   X           X  
Ohio               X  
Oklahoma X X X X X X X X X
Oregon                  
Puerto Rico X X X X X X X X X
Rhode Island                 X
Utah                  
Vermont   X   X     X   X
Washington   X   X       X X
West Virginia   X           X X
Wisconsin X X X X X X X X X
Wyoming               X X
Total 13 17 8 17 9 9 13 16 23

Despite this variation among the states, 17 of the 34 state teams said that Domains 2—"Information authorization and access controls," 4—"Information transmission security or exchange protocols," and 8—"State law restrictions" were more closely related to this scenario. Most state teams were in general (but not complete) agreement that required disease reporting superseded all patient confidentiality. States were aware that the HIPAA Privacy Rule provides specific exemptions to accommodate this requirement. Furthermore, many states suggested that, for notification purposes, the good of the community would make the privacy and security of health information secondary to treatment during the event. Several state teams reported widespread misunderstanding about what state law requires for verification or authorization of the data and for tracking automated release of data in such a scenario. At least 6 state teams noted that many providers and clinicians in their states do not understand the state law and regulatory reporting requirements during suspected bioterrorism or during a potential epidemic and that this misunderstanding results in broad variation in practice. This scenario often presented very clear differences in practices, depending on whether the organizations were using a paper-based or an electronic system. Similarly, states noted that the fact-sensitive nature of the outbreak would determine the amount of patient identifiable information to be given to various parties responding to the outbreak.

2.9.3 Critical Observations

A common theme in the state team reports is that state law and regulations are not yet sufficient to ensure private and secure electronic health information exchange with mandating stakeholders, such as law enforcement. Public health officials must participate in local and state planning for homeland security measures. Providers and public health agencies need to work with law enforcement and other organizations involved with bioterrorism to establish new standards and definitions about what health information is appropriate to disclose, when it is appropriate to disclose, and for what purpose. Some states also suggested that the Department of Health and Human Services, Office for Civil Rights', emergency preparedness decision tool could help remove many barriers nationally in this area, including privacy and security barriers. This web-based interactive decision tool, they note, was designed to help emergency preparedness and recovery planners better prepare for man-made and natural disasters.

Teams of states with experience in actual events (or trainings for them) noted a particularly critical observation: the need for hospitals to implement procedures to inform family members of missing relatives brought to the hospital. Although it is not clear how these conflicting interests can best be reconciled, this issue must be addressed because the ability to find relatives admitted to hospitals during an emergency is a vital area of public concern.

2.10 Employee Health Information (Scenario 14)

14. Stakeholder Organizations and Exchanges

An employee (of any company) presents in the local emergency department for treatment of a chronic condition that has exacerbated and is not work-related. The employee's condition necessitates a 4-day leave from work for illness. The employer requires a "return to work" document for any illness requiring more than 2 days' leave. The hospital emergency department has an EHR and their practice is to cut and paste patient information directly from the EHR and transmit the information via e-mail to the human resources department of the patient's employer.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Determining employee agreement to release information.

  2. Determining what are the minimum necessary elements which can be legally transmitted.

  3. Ensuring the data are secure as they are transmitted.

2.10.1 Stakeholders

The states/territory identified the appropriate stakeholders to review Scenario 14 and to discuss how their current business practices address the scenario in relation to the 9 domains of interoperability. The range of stakeholders was generally broad as were the various roles of the discussants (Table 2-20); see Appendix C for a list of stakeholders. The current business practices provided the opportunity for the states/territory to examine the system and to explore ways to improve or enhance it.

Table 2-20. Stakeholder Groups Engaged in Scenario 14 Reviews
Stakeholder Group Number of States Engaging Stakeholder
in Review of Scenario 14
(N = 34) (%)
Hospitals 26 (76%)
Consumers/consumer advocates 14 (41%)
Employers 10 (29%)
Clinicians 9 (26%)
Physician groups 7 (21%)
Payers 5 (15%)
Community clinics 5 (15%)
Federal health facilities 5 (15%)
Public health agencies 5 (15%)
State agencies 4 (12%)
Legal/compliance community 4 (12%)
Other 4 (12%)
Homecare and hospice 2 (6%)
Professional associations 2 (6%)
Researchers 2 (6%)
Law enforcement/corrections 2 (6%)
IT 2 (6%)
Long-term care facilities 1 (3%)
Mental health agencies 1 (3%)
Laboratories 1 (3%)
Pharmacies/PBM 1 (3%)

Hospital stakeholders who have not transitioned to an electronic system and continue to use hard copy forms reported that their policy was to release only a form that identified the days the patient was to miss work, return to work, or both. Stakeholders agreed that no personal health information would be released in paper or electronic form without a signed release of information from the patient. All stakeholders interviewed stated that a patient has to initiate the request for return-to-work documentation; employers are not able to directly request the information.

Hospitals and physicians are careful to release only limited information to satisfy employers' requests and will not reveal diagnosis-related information. Employers are wary of the liability associated with knowledge of their employees' health information. Consequently, many employers do not request diagnosis-related personal health information. Hospitals and physicians adhere to the standard that a patient authorization to release information to an employer is limited to the current request and does not extend to future requests.

State teams also discussed the use of e-mail and other electronic forms of transmission. Most stakeholders agreed that e-mail is not secure unless encryption is used. Other stakeholders agreed that caution needs be used when one is cutting and pasting information from an EHR: no patient information can be legally included unless a signed permission form is obtained from the patient. The stakeholders were diligent in distinguishing between an inhibitor to electronic health information exchange and measures of security.

Discussants reported that patient information is not usually transmitted to an employer via e-mail. Most often, a letter summarizing treatment or doctor's note is presented in person by the employee or faxed with an appropriate cover sheet by the treating facility. When patient information is transmitted electronically, the HIPAA Security Rule will govern that transmission if made by a covered entity. Such standards require covered entities to implement procedures to verify the identity of a person or entity seeking access to electronic protected health information (PHI), and to implement security measures to guard against unauthorized access to electronic PHI. Furthermore, covered entities are required to implement measures to protect electronic PHI from unauthorized access during transmission.

Health care institutions reported that they require employees to undergo training on confidentiality policies, and employees are required to sign an agreement that patient information will be accessed and viewed only for treatment, payment, or operational reasons that are required to carry out job duties.

Practices and policies associated with administrative safeguards are required to protect electronic PHI and to manage the conduct of a HIPAA covered entity's workforce. Covered entities must limit physical access while permitting properly-authorized access. The specific standards of the HIPAA Security Rule cover facility access controls, workstation use, workstation security and device and media controls.

2.10.2 Domains

Although all of the domains were identified as relevant, Domain 1—"User and entity authentication;" Domain 2—"Information authorization and access controls;" Domain 4—"Information transmission security or exchange protocols;" and Domain 9—"Information use and disclosure policy" were sited most often by the stakeholders (Table 2-21).

Table 2-21. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 14 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.
Alaska X X X            
Arizona   X X X          
Arkansas X   X     X X   X
California   X   X         X
Colorado       X     X   X
Connecticut X X X            
Florida                 X
Illinois X X X X X       X
Indiana       X X        
Iowa                  
Kansas     X           X
Kentucky       X         X
Louisiana X     X X X     X
Maine       X         X
Massachusetts       X       X X
Michigan X     X     X   X
Minnesota                  
Mississippi       X         X
New Hampshire                  
New Jersey   X   X     X    
New Mexico X X   X         X
New York   X   X         X
North Carolina X X X X X X X X X
Ohio   X X            
Oklahoma X X X X X X X X X
Oregon   X X X     X   X
Puerto Rico X X X X X X X X X
Rhode Island   X             X
Utah   X             X
Vermont X     X         X
Washington   X             X
West Virginia X X X X   X X X X
Wisconsin X X   X   X   X X
Wyoming X               X
Total 14 18 12 21 6 7 9 6 25

2.10.3 Critical Observations

Some stakeholders considered Scenario 14 to be among the least problematic of the scenarios they analyzed. They felt that, regardless of size, most health care organizations are keenly aware of the return-to-work rules in their state because they provide the documentation for the return-to-work forms. Larger organizations usually employ an occupational health manager who will instruct the individual's manager about work restrictions and their duration.

Stakeholders reported that employers do not expect to get information from the emergency room electronically. Generally, an employer's terms of employment or organizational policy requires that specific information about the employee's health problem be shared in two instances: (1) if the length of time the employee would be absent from work triggers a claim for temporary disability or workers' compensation issue, or (2) if the employee is performing direct care and needs to be certified as free of any communicable disease.

Transmission of the prescription form or letter from a doctor is usually by hand, mail, or fax.

Employers who participated in the discussions reported that they stored medical information, separate from their other employee records, in a locked filing cabinet in a secure location accessible to specifically assigned and authorized staff only.

One state identified highly variable business practice with respect to the disclosure of individualized health information by health care providers to employers. The implementation of an interoperable EHR system will make this issue an even tougher one for all concerned because of the relative ease of retrieving larger amounts of health information, and the ability to quickly and cheaply transmit such information.

The stakeholders in this state acknowledge the need to reach a greater consensus on the appropriate checks and balances to be used when communicating such information with employers, without sacrificing any more patient privacy than is necessary.

The main business practice raised by this scenario dealt with procedures for communicating with a patient's employer about the patient's ability to return to work. Organizations interpreted privacy responsibility issues differently when communicating with the patient's employer. Some stakeholders removed themselves from the situation by only releasing information directly to the patient. The patient was then responsible for delivering the return-to-work form to the employer. Others said they would provide a note directly to the employer at the patient's request. All stakeholders agreed that no treatment or diagnosis information was required in return-to-work documentation.

Hospital stakeholders with an EHR stated that they would not cut and paste any information from the EHR; however, some EHRs have a software-generated letter on the hospital's letterhead containing limited information that includes treatment date(s), return-to-work date, and any physical limitations. Stakeholders without an EHR stated that they use standard forms with a hospital logo that contain limited information, treatment dates(s), return-to-work dates and any physical limitations.

Consumers who participated in the groups were concerned about employers' having access to their health information. Their specific concern was that the information would be used against them in hiring decisions, reduction in force, and promotion decisions. Also, employees do not want employers to know about mental health conditions, depression, substance abuse problems, or even chronic illnesses or medical problems requiring expensive drugs or frequent service utilization.

2.11 Public Health (Scenarios 15–17)

15. Public Health Scenario A—Active Carrier, Communicable Disease Notification

Without informing his physician, a patient with active tuberculosis (TB), still under treatment, has decided to move to a desert community that focuses on spiritual healing. The TB is classified MDR (multidrug resistant). The patient purchases a bus ticket—the bus ride will take a total of 9 hours with 2 rest stops across several states. State A is made aware of the patient's intent 2 hours after the bus with the patient leaves. State A now needs to contact the bus company and other states with the relevant information.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Providing patient-specific information related to a specific communicable disease to law enforcement, nonhealth-care entities, and health department in a situation where authorities are responding to a threat.
  2. Ensuring the data are secured as they are transmitted.
16. Public Health Scenario B—Newborn Screening

A newborn's screening test comes up positive for a state-mandated screening test, and the state lab test results are made available to the child's physicians and specialty care centers specializing in the disorder via an Interactive Voice Response (IVR) system. The state lab also enters the information in its registry and tracks the child over time through the child's physicians. The state public health department provides services for this disorder and notifies the physician that the child is eligible for those programs.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. Providing patient-specific information related to specific symptoms of a disease to a health department in a situation where a targeted disease is being investigated.
17. Public Health Scenario C—Homeless Shelters

A homeless man arrives at a county shelter and is found to be a drug addict and in need of medical care. This person does have a primary care provider, and he is sent there for medical care. The primary care provider refers patient to a hospital-affiliated drug treatment clinic for his addiction under a county program. The addiction center must report treatment information back to the county for program reimbursement and back to the shelter to verify that the person is in treatment. Someone claiming to be a relation of the homeless man requests information from the homeless shelter on all the health services the man has received. The staff at the homeless shelter are working to connect the homeless man with his relative.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  • The extent and amount of information shared between the various facilities would be limited by the minimum necessary guidelines.

2.11.1 Stakeholders

Although a wide variety of stakeholders contributed to these scenarios across the 34 participating states, most input for Scenarios 15 and 16 came from public health agencies, with 33 out of the 34 (97%) state teams mentioning input from a public health agency representative specifically when discussing these scenarios (Table 2-22). In many cases, additional input was gathered from laboratories and clinicians. For most states, Scenario 17 generated more widespread input than Scenarios 15 and 16; although public health and state government agencies were still strongly represented, hospitals, state government, community clinics, and physician groups were also active, strong contributors. Notable contributions also came from homeless shelters in five states. Four states combined Scenarios 15-17 with Scenario 18, while one state combined Scenarios 15-17 with Scenario 13. It was impossible to distinguish which stakeholders responded to each of the scenarios; therefore, all listed stakeholders were included in Scenarios 15-17 as well as with either Scenario 13 or 18, depending on the state.

Table 2-22. Stakeholder Groups Engaged in Scenario 15–17 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder
Group in Review of Scenarios 15–17
(N = 34) (%)
Public health agencies 33 (97%)
State government 22 (65%)
Hospital personnel/emergency room staff 22 (65%)
Community clinics and health centers 18 (53%)
Clinicians 15 (44%)
Physician groups 12 (35%)
Laboratories 12 (35%)
Consumers/consumer organizations 12 (35%)
Correctional facilities/law enforcement 11 (32%)
Medical and public health schools that undertake research 10 (29%)
Federal health facilities 8 (24%)
Payers 8 (24%)
Professional associations 8 (24%)
Mental/behavioral health 7 (21%)
Homecare and hospice 6 (18%)
Long-term care facilities/nursing homes 6 (18%)
Pharmacies 5 (15%)
Homeless shelters 5 (15%)
Privacy officers 2 (6%)
Health care attorneys 2 (6%)
Health information personnel 2 (6%)
RHIOs 2 (6%)
Information security 2 (6%)
Quality improvement organizations 2 (6%)
Data vendor 1 (3%)
County government 1 (3%)

2.11.2 Domains

As with stakeholder representation, 4 of the state teams combined Scenarios 15-17 with Scenario 18, and one state combined Scenarios 15-17 with Scenario 13. Again, these states did not identify which domains were pertinent to which scenarios, so all cited domains were included in both scenario groupings. The business practices collected for this scenario group focused on information exchange in public health, state government, and health oversight situations. Some state teams discussed how these scenarios touched on all 9 domains; however, some domains were clearly cited more frequently than others (Table 2-23).

Table 2-23. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenarios 15–17 (N = 34)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain.

a State team combined Public Health Scenarios 15–17 with State Government Oversight Scenario 18.

b State team combined Public Health Scenarios 15–17 with Public Health-Bioterrorism Event Scenario 13.
Alaska X X       X X    
Arizona X X   X X   X X X
Arkansas     X X       X X
California           X X X X
Colorado       X       X X
Connecticut X X X X X X X X X
Florida   X           X X
Illinois X X   X   X X X X
Indianaa   X X X       X X
Iowaa   X X X X   X X X
Kansas X X X X X X X X X
Kentucky X     X       X X
Louisiana X X X X     X X X
Mainea               X X
Massachusetts X             X X
Michigan X X X X X   X X X
Minnesota X X X X X X X X X
Mississippi       X     X   X
New Hampshire   X             X
New Jerseya   X X X       X X
New Mexico X X   X   X   X  
New Yorkb X X X       X   X
North Carolina X X X X X X   X X
Ohio   X   X       X  
Oklahoma X X X X X X X X X
Oregon   X         X X X
Puerto Rico X X X X X X X X X
Rhode Island               X X
Utah               X  
Vermont X X   X X       X
Washington X   X X     X X X
West Virginia   X X X       X X
Wisconsin X X X X X X X X X
Wyoming                 X
Total 18
53%
23
68%
16
47%
23
68%
11
32%
12
35%
17
50%
27
79%
29
85%

Domain 9—"Information use and disclosure policy" was referenced most often, with 29 out of 34 state teams explicitly including discussions about business practices related to this domain. Although this domain is clearly important in discussions of public health issues, the actual business practices about use and disclosure in these scenarios are relatively consistent when compared to other scenario groupings.

This consistency is especially true in Scenario 15. All state teams agreed that the provider's disclosure of the patient's condition to a public health authority is permitted pursuant to the HIPAA Privacy Rule in the case of TB. Then, in most states, the primary contact occurs between public health entities using interjurisdictional notification from one state to another. Once communication has been established, there is no noted resistance to the idea of exchanging the patient's personal health information. However, one stated noted that public health entities have no agreement to communicate anything other than demographic data.

Some variation emerged among state teams about how much information was to be disclosed to either law enforcement or the bus company. Most state teams said that their public health agencies would share communicable-disease information with law enforcement and other entities (eg, transportation companies), but the level of information shared differed. For example, some states would allow the public health departments to notify the transportation company of the incident but would not disclose the identity of the patient, whereas other states would identify the patient to the transportation company but would not disclose the diagnosis. In one state, however, no rules exist to govern the disclosure of information to either law enforcement or other entities; therefore, public health agencies generally do not disclose information. This nondisclosure often creates a conflict with law enforcement personnel, who feel it impedes their ability to do their jobs.

Few state teams mentioned the idea of releasing health information about the infected individual to passengers because doing so was not necessary to contain the threat to public health. However, most state teams discussed disclosure of exposure in general to the passengers. Some states notify passengers directly of their exposure, allowing the local public health office at the site of interception to manage the initial disclosure. Most states also relied on contact with the exposed individual's local public health department to follow up with the bulk of responsibilities, including release of follow-up information concerning their exposure and testing.

Minor variation among states also occurred in Scenario 16. All state teams recognized the right to collect and store data in a disease registry for public health reporting purposes; however, variation exists in how and to whom the data are disclosed. Many states agreed that they would not disclose the information directly to a specialty care center, but instead, would choose to disclose this information to the physician. In fact, a few state teams mentioned that the physician was the only source to whom they would release test results. In almost all states, the providing physician's job is to inform the parents about the services available for their child. In regard to disclosure to the parent, most states leave this disclosure up to the providing physician. However, in other states the public health department makes the disclosure directly to the parent by letter, which informs them about the specialty care service and centers that are available to them. Tracking additional treatment information for individual patients over time was not discussed.

The variation in use and disclosure for Scenario 17 became broader. Most shelters providing input on the scenario agreed that disclosure of any health record information, even to a relative, would require written consent of the patient. This is especially true of specially protected information such as substance abuse treatment. However, a good number of state teams debated the shelter's covered entity status under the HIPAA Rules. Consequently, very few treatment programs reported that they would disclose information to the shelter. Although many state teams reported that homeless shelters would not, without written consent, even confirm or deny the presence of the patient to a relative, the fear of secondary disclosure in this exchange was extremely high.

The transmission of patient information for treatment purposes between the primary care provider and drug treatment clinic requires written consent of the patient in most states, even though consent or authorization is not required for such purposes by the HIPAA Privacy Rule. Further, 32 states agree that the release of patient information for payment purposes is permissible without written consent under the HIPAA Privacy Rule. Many stakeholders within the state referenced minimum necessary guidelines, although specifics concerning these guidelines were not clearly outlined in this section of the state reports, other than to say there were a multitude of interpretations across entities within the state. Three state teams cited specific state laws and 42 C.F.R. pt. 2 as requiring specific signed agreements before the drug clinic could disclose the information to the county for payment. Specifically, the 3 state teams reported that they would need either a BAA/qualified services organization agreement, a signed disclosure agreement, or a signed acknowledgement of confidentiality and disclosure agreement from the patient to exchange data for purposes of payment, even from a government program.

All 3 scenarios within public health touched on business practices that mapped to Domain 8—"State law restrictions," and 27 of the state teams discussed this domain specifically. Many of the disclosure practices already discussed are governed by state law. In most cases, these state laws exist in order to reinforce or provide additional requirements around practices that are permissible, but not mandated, under the Privacy Rule.

In discussing Scenario 15, most state teams specifically referenced the existence of laws mandating the reporting of TB, but laws governing the release of that information vary (see discussion of Domain 9) and often are misunderstood by stakeholders outside the public health entities.

A wider variety of laws govern the practices in Scenario 16. In most states, some type of newborn screening is mandatory. In states where the screening is not mandated by law, information is still routinely collected after consent is given as part of consent to treatment related to birth. Only one state reported an opt-out provision for the actual screening itself. This opt-out seemed to be tied to the state statute requiring additional provisions for the collection of genetic information.

More variable state law restrictions appear in the release of the registry information (see previous Domain 9 discussion). Three states have an opt-out provision for their registry, which is usually presented as an option by the providing physician.

State teams were almost uniform in their discussion of the state law restrictions for Scenario 17, indicating that state laws impose greater restrictions on information exchange, even for treatment purposes, in substance abuse and mental health cases than in other cases. Although exchange of personal health information is often allowed for purposes of treatment or payment without written consent by the patient, written consent is almost always required for exchange of substance abuse or mental health information. Written consent seems to be the standard practice, regardless of the state law. Even in instances when exchange of information is permitted for treatment or billing, no team reported that its state would release this information to relatives without written consent of the patient.

Domain 4—"Information transmission security or exchange protocols"—was cited by 23 of the 34 state teams. For Scenario 15, transmission by telephone was the most common method because it was thought to be the most expedient and reliable form of data exchange in an emergency. Although some states have automated alert systems, these systems rarely cross state lines. The HIPAA Security Rule prohibits transmission of public health information by covered entities by e-mail without encryption or similar protections. Currently, states have had little or no discussion, even in geographic regions, about the security of their electronic systems, although this discussion might lead to eventual interstate data exchange between public health entities.

For Scenario 16, many state teams indicated that their state did not have an IVR system comparable to that presented in the scenario. Although the precise method of transmitting data varied among states, the majority of states collect information from a single state laboratory. In a minority of states, this process is not centralized and, therefore, results are sent from multiple laboratories. In states where multiple entities provide information for the registry, each individual health care provider has an agreement by which the registry uses and discloses information only as allowed by state statute. In all, the transmission between the laboratory and the registry in this scenario is likely to be electronic, especially if a central state laboratory is used. When electronic systems are not used, laboratories typically transmit information to the registry by telephone or fax. States with more advanced EHR systems transmit laboratory data to the state public health agency by secure VPN. These electronic systems usually have a disclosure log to track all disclosures.

At least one state team also reported returning the lab results electronically to participating physicians by VPN, although this level of advancement is rare. Notification is often centralized from the registry, and physicians are usually notified only in the event of an abnormal or positive result. In most states, this communication is done by phone and, in some cases, by fax.

Scenario 17 involved a greater number of data exchanges than the others. However, states reached a broad consensus that, because of very little electronic interoperability and because of the specially protected records being exchanged, most of these exchanges would occur by fax or mail if they were allowed to occur at all. Most providers did not report using e-mail, because of the continuing lack of trust in it as a secure data transfer mode, especially when entities are discussing the transfer of mental health or substance abuse records.

Within Domain 2—"Information authorization and access controls"—23 state teams mentioned business practices. Most state teams agreed that exchange of information in an emergent situation or in an imminent public health emergency does not require patient authorization. Exceptions do exist in the case of substance abuse and mental health records. The range of public health scenarios unearthed the differences in procedures when there is no public health emergency. Because of lack of adequate information-sharing protocols, in nonemergency situations, exchange between state public health departments and those involving multiple entities are far more difficult than in emergencies. Unless the patient has clearly given authorization for the exchange to occur, this lack of information more often than not slows or prevents the exchange of data.

Analysis of Scenario 16 specifically shows that most states have a centralized, secure transfer of information between the state lab contracted to perform newborn screenings and the public health registry. Most public health registries are not open for access to individual physicians; therefore, access is limited to only a small number of public health employees. Although few states explained these systems in detail, the few that did outlined the use of passwords, various levels of access, audits of user activity, and high-level encryption. In one state, registry input can be done via the Internet, using a downloadable program installed at the physician's office. The notification of individual patient data among the laboratories and providers, registry and providers, and laboratories/providers and parents is quite variable, as mentioned in the discussions of Domains 8 and 9.

For Scenario 17, the data are not kept in a central registry nor is reporting mandated to a central authority; therefore, a wider variety of authorization and access controls was reported for this scenario. For the majority of state teams reporting, these records would be largely paper based; therefore, the inconsistency of authorization and access controls would result in greater restrictions to the exchange of information—restrictions attributable to the specially protected records being requested. A few states that have electronic billing systems outline requirements such as electronic enrollment into the system and use of user IDs and passwords for submitting electronic patient information. Access roles are also assigned (such as "read only" or "add/modify") according to job requirements. However, those state teams that discussed electronic systems of this type also mentioned that mental health and substance abuse data were kept separate from a patient's regular health data.

2.11.3 Critical Observations

A variety of critical observations were noted by the state teams for the public health scenarios. This section discusses those concerns shared by many states, as well as those that were raised by only 1 or 2 states but seemed particularly important or conveyed strong insight.

Many states mentioned that the use of TB in Scenario 15 made the situation fairly uncomplicated. Patients with active cases of TB are required to comply with treatment, and have restrictions on travel while in the infectious phase. States have clear guidelines and processes in place for notifying all involved parties regarding communicable disease transmission or outbreak. Some states mentioned that disease reporting is provided for in all patient confidentiality laws, including the HIPAA Privacy Rule.

For many other types of communicable diseases, variation in mandatory reporting exists and would create more difficulty for interstate cooperation. One state indicated that a national law is needed that standardizes the process for handling people with communicable diseases who intentionally put the public at risk when they cross state lines. Additionally, an agreement on diseases requiring cross-border sharing would be helpful, as would standardizing the means by which health information is transmitted from one jurisdiction to another. Currently, the response to a communicable disease would vary depending on the magnitude of the risk to public health, including whether the infected patient planned to travel by airplane and the type of disease.

Many state teams mentioned that, although processes for dealing with Scenario 15 in particular are fairly straightforward, the ability to verify facts and transmit to or coordinate with other states would be greatly enhanced by the availability of an interoperable, electronic clinical information system or registry. One state team also noted the value of knowing whom to notify in other states, including both the health authorities and the law enforcement authorities, and how to notify them outside business hours. This team indicated that such a system could provide this information. On the other hand, at least one state team mentioned that its stakeholders felt that personal relationships are often a key element in transmitting data in a public health emergency, and an electronic system might remove the important human element.

Although the status of the homeless shelter was debated in a number of state discussions, only one state reported that its stakeholders agreed that county health departments are generally not covered entities under the HIPAA Rules. Stakeholders in this state proposed that the HIPAA Privacy Rule be changed through whatever mechanism appropriate to include entities that function like their county health departments as covered entities. Stakeholders in this state reported that there was a lack of transparency surrounding health information disclosures related to public health, one reason being that public health entities are not required to provide an accounting of disclosures. Once involved in a public health situation mandating certain reporting, patient health information is shared as necessary, but stakeholders raised examples in which patients were surprised to learn of instances in which their health information had been shared.

Several states noted that public and state officials expressed concern about the lack of integration in their systems. They felt that public health remained compromised because of the inability of systems to easily track and monitor threats to public health. This observation also led to the general agreement that significant technological barriers related to adopting more integrated electronic systems exist among physician groups or clinicians, hospitals, county health departments, and the like.

However, a more advanced, centralized system does not remedy all technological issues. According to some providers, specific consents for specially protected information create significant difficulties from a technical point of view, because consent is required at every instance of disclosure. Initial technical effort to address the filtering of specially protected information within EHRs, such as genetic information obtained in a newborn screening registry, requires "filtering" logic to check against all available record information that may be transferred. From a consumer advocate point of view, specially protected health information consent requirements provide a high level of privacy protection for sensitive health information. For solutions to this particular issue, a more granular approach to the documentation of consent in different kinds of circumstances might be appropriate for consideration.

State teams also reported challenges that occur with public health HIEs when they require interstate communications. For example, a provider in State A examines a patient from State B; the provider must then report to one or both states. Conversely, a provider from the same State B sees a patient from State A and has to exchange public health data between agencies across states. The challenges arise because of the differences in state law governing reporting, differences in privacy and protection of health information, and disparate business practices.

One state team noted that the business practices related to reporting requirements and gathered from actual public health employees differed greatly from the practices assumed by nonpublic health stakeholders, and this difference illustrated a gap in understanding. In general, some state teams found that stakeholders believe a lack of transparency exists about health information disclosures related to public health. Some aspects of public health activities are not covered by the HIPAA Rules and do not require an accounting of disclosures. Once involved in a public health situation mandating certain reporting, health information is shared where necessary, and stakeholders raised examples in which patients were surprised to learn with whom their health information had been shared.

2.12 State Government Oversight (Scenario 18)

18. Health Oversight: Legal Compliance/Government Accountability

The governor's office has expressed concern about compliance with immunization and lead screening requirements among low-income children who do not receive consistent health care. The state agencies responsible for public health, child welfare and protective services, Medicaid services, and education are asked to share identifiable patient-level health care data on an ongoing basis to determine if the children are getting the health care they need. This is not part of a legislative mandate. The governor in this state and those in the surrounding states have discussed sharing this information to determine if patients migrate between states for these services. Because of the complexity of the task, the governor has asked each agency to provide these data to faculty at the state university medical campus who will design a system for integrating and analyzing the data. There is not an existing contract with the state university for services of this nature.

Potential areas of discussion of BUSINESS PRACTICES based on this scenario:

  1. What is the practice of the organization to provide appropriate information for health care oversight activities? These may include:

    – Determining minimum amount necessary.

    – How to release (electronically or paper—with existing claims data).

2.12.1 Stakeholders

For input on Scenario 18, 26 of the state teams gathered data from public health entities, 21 from state government officials, and 20 from schools that conduct research (Table 2-24). Other common stakeholder groups included hospitals (13), community clinics (10), and clinicians (9). Four of the states combined Scenarios 15-17 with Scenario 18. Because these states did not specify the stakeholders participated in particular scenarios, every stakeholder listed was included in both Scenarios 15-17 and Scenario 18. Additionally, one state reported no stakeholder participation for Scenario 18.

Table 2-24. Stakeholder Groups Engaged in Scenario 18 Reviews
Stakeholder Group Number of State Teams Engaging Stakeholder Group in Review of Scenario 18a
(N = 33) (%)
a One state did not have stakeholder representation for this scenario.
Public health agencies 26 (79%)
State government 21 (64%)
Medical and public health schools that undertake research 20 (61%)
Hospitals 13 (395)
Community clinics 10 (30%)
Clinicians 9 (27%)
Payers 7 (21%)
Consumers 6 (18%)
Professional associations 6 (18%)
Physicians groups 5 (15%)
Federal health facilities 5 (15%)
Laboratories 4 (12%)
Long-term care facilities/nursing homes 4 (12%)
Quality improvement organizations 3 (9%)
Privacy officers 3 (9%)
Correctional facilities/law enforcement 3 (9%)
Homecare and hospice 3 (9%)
Mental/behavioral health 3 (9%)
Health IT/information 3 (9%)
Health care attorneys 2 (6%)
RHIOs 2 (6%)
Data vendor 1 (3%)
County government 1 (3%)

2.12.2 Domains

As with the stakeholder representation, 4 of the 34 state teams combined their analysis of Scenario 18 with the analysis of Scenarios 15 through 17 (public health; Table 2-25). The breakout of major domains identified by the state teams indicates that not only do the major stakeholders overlap between Scenarios 15-17 and Scenario 18, but the major privacy and security domain issues overlap as well. Additionally, two states did not list any domains for this scenario. One state had no stakeholder participation and, therefore, did not respond, while the participating stakeholders in the other state indicated that this particular scenario did not apply to their state.

Table 2-25. Nine Privacy and Security Domains Affected by Business Practices Associated with Scenario 18 (N = 32)
State Team (1) (2) (3) (4) (5) (6) (7) (8) (9)
Note: Domains of privacy and security are indicated in columns 1–9 as follows: (1) User and Entity Authentication, (2) Authorization and Access Control, (3) Patient and Provider Identification, (4) Transmission Security, (5) Information Protection, (6) Information Audits, (7) Administrative and Physical Safeguards, (8) State Law, and (9) Use and Disclosure Policy. An X indicates that the state team identified at least one business practice affecting that domain. An empty cell indicates that no business practice was identified in association with that domain. Two state teams did not list domains for this scenario.

a State team combined Public Health Scenarios 15–17 with State Government Oversight Scenario 18.
Alaska                  
Arizona             X X X
Arkansas   X   X X   X X X
California                 X
Colorado       X         X
Connecticut X X X X X X X X X
Florida   X           X X
Illinois   X   X         X
Indianaa   X X X       X X
Iowaa   X X X X   X X X
Kansas X X X X X X X X X
Kentucky   X         X   X
Louisiana X X   X     X X X
Mainea               X X
Massachusetts                 X
Michigan X X X X   X X X X
Minnesota X X X X X X X X X
Mississippi       X         X
New Hampshire   X             X
New Jerseya   X X X       X X
New Mexico       X       X  
New York   X           X  
North Carolina                  
Ohio   X   X       X  
Oklahoma X X X X   X X X X
Oregon                 X
Puerto Rico X X X X X X X X X
Rhode Island                 X
Utah                 X
Vermont X X   X X X X   X
Washington   X         X   X
West Virginia       X       X X
Wisconsin X X X X X X X X X
Wyoming                 X
Total 9
28%
20
63%
10
31%
20
63%
8
25%
8
25%
14
44%
18
56%
28
%

Domain 9—"Information use and disclosure policies"—was cited by 28 of the 32 state teams. Almost all state teams indicated that the use of patient-level information outlined in this scenario is typically forbidden without signed patient consent and prior approval by an IRB. The general consensus among state teams was that collected data could not be transmitted from a state health agency to a university without legislative authorization or a data-use-and-sharing agreement. Even though a data-use-and-sharing agreement could allow disclosure of the data in many states, the lack of standard data-sharing agreements and lack of a common language among stakeholders from different states make sharing data across state lines difficult, given this scenario. The state teams found this to be infeasible because of the sensitivities and the regulations that would have to be met for the state health agency to share identified data with the university. Many state teams discussed the slightly more realistic goal of just combining data from multiple entities. Although some states have a centralized database to collect this information, many do not. To construct a complete picture, data from different agencies would have to be combined, which would pose difficulties because the information was collected with different intentions and permissions. To provide patient-identifiable data for secondary public health use, health organizations must have either patient authorization or a legal mandate.

Domain 2—"Information authorization and access controls"—was cited by 20 of the 32 state teams. Most state teams that entertained the idea of the exchange (if all other considerations mentioned in Domains 8 and 9 were met) stated that authorization would have to be given by all individuals included in the database because the data would supposedly be identifiable when transmitted to the university. State teams discussed some of the issues in Domain 2 that were required for their own state immunization databases (without discussing the issue specifically of supplying these data to other entities or across state lines). In all these systems, users were required to sign confidentiality agreements before gaining access to the information.

Domain 4—"Information transmission security or exchange protocols"—was listed by 20 of the 32 state teams. A few states that have advanced electronic immunization and lead-screening systems provided guidelines for secure transmission. Transmission of identifiable information from a public health laboratory happens via secure FTP or secure VPN connection, using assigned log-in names and passwords. In one state, the electronic system employs complete role-based access to secure the information. States that theorized the sharing of information between the state agency and the university assumed that this transaction would almost always be electronic. The information would be exchanged via a secure site utilizing public or private encryption keys assigned to users.

Domain 8—"State law restrictions"—was cited by 18 of the 32 state teams. In states with complex legal structures, an enormous amount of legal analysis—taking into account immunization laws, general information privacy laws, and federal and state laws governing the disclosure of information from state agency programs—would have to be undertaken to determine whether this data collection was even permissible. In a few states with advanced electronic systems, the reporting of immunization data is mandated, but most states have optional reporting. Even states that had advanced systems agreed with most other states, indicating that the action of actually combining data with that from other states would require a legislative mandate.

2.12.3 Critical Observations

One suggested reason for the strong resistance to sharing data electronically is that the HIPAA Security Rule requires that a covered entity implement procedures to prevent unauthorized access to PHI that is being transmitted (see 45 C.F.R. § 164.312(e)). However, the Rule does not offer specific guidance about how to achieve this protection against interception of transmitted information.

Although the HIPAA Privacy Rule permits a covered entity to disclose PHI for purposes of data aggregation with the PHI of another covered entity under a BAA (45 C.F.R. § 164.504(e)), in this scenario states are asked to imagine a data aggregation by public health and other government agencies that in many cases are not covered entities. These agencies are often required by state statute to maintain confidential records, and this fact is seen as potentially problematic for interoperable health information exchange.

Several states also mentioned the Family Education Rights and Privacy Act (FERPA). Even if appropriately strong business agreements could be put in place, FERPA controls all school records, and it has its own privacy and security concerns that are not entirely consistent with the HIPAA Rules. Therefore, parents' authorization or consent will likely be required for the release of the educational record, although an exception may or may not apply to this scenario (34 C.F.R. § 99.31 permits disclosures in cases of health and safety emergency).

One state reported that it already has a state registry of childhood immunizations that operates as a public authority under a contract with the state. No authorization is required for a health care provider to disclose immunization information to the registry. However, Medicaid does not share immunization data with the registry, creating an incomplete picture of immunization rates among low-income children. The state has suggested trying to negotiate a memorandum of understanding between the registry and Medicaid to remedy this situation. Another state is currently considering a system similar to that proposed in the scenario and has encountered major problems with sharing Medicaid data. Medicaid data cannot be shared for purposes other than to administer the Medicaid program. The proposed alternative is to gather consent from all participants.

One state has already successfully addressed issues related to accessing Medicaid data. The team noted that Medicaid generally allows data sharing with data use agreements when the study seeks to improve the administration of the state Medicaid plan. They found that university faculty will often participate in a state initiative that requires their expertise. Additionally, their health department of already collects and maintains immunization and lead data through statutory authority or legal agreements, with processes in place to maintain confidentiality of the data. In this state, Medicaid frequently contracts with state universities on issues described in this scenario. Another team suggested that other state teams may want to consult this team's Medicaid electronic records system findings related to barriers encountered during its pilot program, because it involves Medicaid data exchange.

The state with the existing immunization registry also has state statutes that require the Board of Health to establish a lead-screening method and frequency. The Board of Health adopted rules in 2001 requiring that all low-income and at-risk children be screened for lead at 12 and 24 months. Lead levels are a reportable event and use and disclosure of the information is required to be reported by the state. Their governing statutes and regulations allow their Public Health Department to receive and use the data collected from lead screenings to promote the health and welfare of the children. This state reported that no additional parental authorization would be needed for the Public Health Department to share the data with the university, unless the university uses the data for other purposes, such as research.

Ultimately, many stakeholders expressed uneasiness about providing information in identifiable form to the university when analysis could be conducted with information in de-identified form. Although the HIPAA Privacy Rule allows the sharing of information by a covered entity for research purposes, subject to conditions, implementation guidelines could differ among organizations. Many state teams felt that the variations in agreements among entities created a chasm that could not easily or quickly be remedied to create an interstate data-sharing program.


3. SUMMARY OF KEY ISSUES RAISED BY THE STATE TEAMS IN THE ASSESSMENT OF VARIATION

This section provides an overview of key issues that the state teams have raised and that have implications for the development of privacy and security requirements for electronic health information exchange.

3.1 Variation in the Interpretation and Application of Consent

The state teams have identified broad variation in the need for (perceived or otherwise) and the actual process of obtaining appropriate patient consent or authorization to disclose identifiable health information. The variation in application and implementation of obtaining patient consent is due to a number of factors, primarily including

Widespread confusion exists about the terms used for obtaining patient permission. This confusion results partly from the HIPAA Privacy Rule's use of different terms and requirements for permissions that are related to different purposes: the term consent applies to written patient permission to use and disclose health information for treatment payment and health care operations, while the term authorization is used to describe patient permission to use and disclose health information for other purposes not otherwise permitted or required by the Rule. Adding to the confusion is the variance of terms in state laws such as consent, authorization, release, and others to describe written patient permission to disclose health information.

3.1.1 Consent for Treatment, Payment, and Health Care Operations

The HIPAA Privacy Rule specifically permits, but does not require, a covered entity to obtain written patient permission (called consent) for uses and disclosures of protected health information (PHI) for treatment, payment, and health care operations (see 45 C.F.R. § 164.506(b)). No form is required for consent to share information for treatment, payment, and health care operations under the Privacy Rule; the content and format of consent to share information for these purposes are wholly within the discretion of the covered entity. The Privacy Rule, however, does require patient permission to disclose health information for many purposes other than treatment, payment, or health care operations (called authorization). The Privacy Rule imposes specific content requirements on such authorizations. The Privacy Rule provisions are not well-understood and are frequently confused with state law requirements and federal requirements. Many states believe that patient consent is required for treatment, payment, or health care operations. 9  In addition, many states fail to make the distinction between consent and authorization under the Privacy Rule and use the terms interchangeably.

Although the Privacy Rule allows the disclosure of health information for treatment, payment, or health care operations without consent, many state laws require such written consent to disclose health information for these purposes, using various terms in addition to consent, such as permission, authorization, or release (here, collectively referred to as consent). In most states, the content of such patient consent forms is not defined, leaving health care entities free to develop their own forms. In addition, many providers and other covered entities require patient consent to disclose health information for these purposes because of professional ethical requirements or for risk management purposes. In fact, the state teams reported that most stakeholder organizations participating in this project require patient consent for treatment in the absence of state laws or regulations requiring such permission. Even though the variation in the requirement for and content of patient permission to disclose is found primarily in the state laws and organizational practices, the Privacy Rule is often cited as the basis for requiring consent.

The term or acronym HIPAA appears to have become a generic explanation for nearly all privacy practices and policies that restrict the disclosure of health information; it is frequently cited as a source of concern and the reason that organizations adopt conservative disclosure policies. However, fear of sanctions for being found noncompliant with the HIPAA Rules is not the only source of concern. State teams have reported concerns about federal regulations governing chemical dependency treatment records; state regulators who conduct reviews based on licensure; state licensing boards that license individual providers such as physicians, nurses, chiropractors, and others; litigation by patients; and negative publicity.

Although all sources of liability are of concern to health care organizations, negative publicity was reported to be a significant source because of the resulting damage to the "brand" or reputation of a health care organization. Once damaged, a reputation is difficult to restore; only the passage of time can lessen the damage. Such liability is difficult to measure and difficult to counteract. Negative publicity can also result in the loss of patient confidence, a reduction in the number of payers willing to do business with a provider, and a reduction in the value of goodwill and reputation that the provider has developed over time. Because liability for inappropriate or unauthorized disclosures of health information can result in significant loss that is not easily remedied, health care organizations are cautious in their approach to exchanging data. When health care organizations have liability concerns about the exchange of information, the exchange will generally not occur. They want to be confident that any mechanism for HIE has adequately addressed privacy and security issues and minimizes their organization's liability.

3.1.2 Specially Protected Information

In general, the HIPAA Privacy Rule considers all PHI equally sensitive and, with the exception of psychotherapy notes, permits PHI to be used and disclosed for treatment, payment, and health care operations without patient permission. In contrast, a variety of federal and state statutes and regulations (laws) afford special protections for certain classes of information generally perceived as particularly sensitive and in need of a higher standard of privacy protection (eg, HIV, substance abuse, mental health, genetic information). These laws typically require patient consent to disclose health information, often even for treatment. Several state teams reported confusion about how to handle specially protected information in accordance with these federal laws, including 42 C.F.R. pt. 2, Federal Substance Abuse Regulations, and state laws and business practices. State teams cited concerns about how to electronically meet the requirements of these laws, particularly how electronic systems will handle specially protected data and restrict the sharing of specially protected patient information. States are also struggling with how systems will effectively manage the consent for the disclosure of specially protected information. The latter concern arises from federal and state legal requirements that downstream recipients also obtain consent to redisclose information once it is in their possession.

The state teams have made it abundantly clear that the interplay among the HIPAA Rules, federal regulations that afford special protections to sensitive data, and state privacy laws creates confusion for many stakeholders. Some state teams have called for treating all health information the same by requiring patient permission for disclosure of all categories of health information.

3.1.3 Challenges Ahead

Many opportunities exist for variation as organizations navigate the regulations and policies governing consent. Four important elements affect the way organizations implement patient consent procedures: (1) federal privacy laws and regulations; (2) state privacy laws and regulations; (3) specific program requirements (such as Medicaid and public health); and (4) professional ethical obligations and additional business practices, policies, and procedures established by organizations, above and beyond what laws and regulations require. Additionally, other factors that must be considered include the following: (1) who is disclosing the health information; (2) what information is being disclosed; (3) to whom the information is being disclosed; (4) when and how the information will be disclosed; (5) who collects the patient consent (the submitter of data vis-à-vis the requester of data); and (6) the purpose of the disclosure.

The reported variability in the interpretation and application of privacy laws and regulations concerning patient consent or authorization has additional factors, many of which can be mitigated (if not eliminated altogether) by using an electronic consent management system. Although the state teams have not developed specifications for a consent management system, they have identified many issues that will need to be resolved to move in that direction. For example, a common approach to consent is needed, one that includes definition of terms and what the required and optional elements might be.

The state teams reported multiple approaches to patient consent and the role of consumers, including, but not limited to:

Additional models, such as the full opt-out approach, give patients an all-or-nothing choice about whether to include their health information in a regional exchange. The partial opt-out approach allows patients to selectively withhold the sharing of certain information (eg, mental health) while exchanging the rest of the health information.

As already noted, the HIPAA Privacy Rule prescribes the content of a HIPAA patient authorization form (used in connection with those disclosures not related to treatment, payment, and health care operations and those that do not have a regulatory permission within the Privacy Rule), but most states requiring patient consent for disclosure offer no definition of what the patient consent form is or what the required and optional elements should be. In addition, accepted methods must be identified to collect and secure patient consent. In some circumstances, an e-mail submission was believed sufficient; in others, a faxed form was an acceptable method; and yet in others, a "wet signature" document was required to be on file. State teams are also working through issues related to the lack of standard procedures and business practices to confirm a patient's signature on a patient consent form. Many questions remain about the validity, applicability, and acceptability (legal and otherwise) of digital signatures to support patient consent procedures. The lack of a recognized standard for the use of electronic signatures in conjunction with electronic patient consent forms was highlighted by a number of state teams as a major barrier to automating the process of securing, processing, and storing consents and authorizations. Most states still rely on a "wet signature" to go along with a paper-based patient consent form, even though in most of these states electronic signatures are already recognized as legally acceptable business practices in other industries.

Moving to an electronic consent management system will require the state teams to clarify when patient consent is required under state or federal law, the requisite processes for obtaining such consent, and the mandated content of such consent. The difference between the terms consent and authorization as used in the HIPAA Privacy Rule, as well as the circumstances under which each term applies, requires clarification. Many of the state teams have identified as a priority the need for a model consent form that can be modified to accommodate the needs of the state to reduce the variation.

3.2 Misunderstandings and Differing Applications of HIPAA Privacy Rule Requirements

States reported many business practice variations based on different interpretations and applications of the requirements of the HIPAA Privacy Rule. The variation in the application of the Privacy Rule provisions was often identified as a barrier to interoperable electronic health information exchange. Many state teams reported broad variation in how the provisions of the Privacy Rule are interpreted and applied at the organizational level. This variation in the application of the rule has been identified as a barrier to interoperable electronic health information exchange by the majority of state teams.

The state teams report a general lack of understanding about the Privacy Rule's premise to generally allow for uses and disclosures of PHI for the core treatment, payment, and health care operations purposes (those activities necessary for the health care system to operate). This lack of understanding is reflected in the business practices and policies of many stakeholder organizations. In some cases, the organizations understand the basic provisions of the Privacy Rule but do not understand how and when state law applies. Additional variation is introduced by organizational policies, many of which predate the Privacy Rule and, in an effort to reduce the risk of incidental or accidental disclosures, are more restrictive than the Privacy Rule, but which are now erroneously attributed to the Privacy Rule provisions. Summarized in this section are some examples from the state teams regarding HIPAA-related issues. The state teams' most commonly reported source of variation related to the Privacy Rule is the interpretation and application of the minimum necessary standard.

3.2.1 Minimum Necessary

The HIPAA Privacy Rule states that "a covered entity must make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request" (45 C.F.R. § 164.502(b)). In order to meet this standard, with respect to many routine uses and disclosures of health information, a covered entity must establish policies and procedures to limit information used and disclosed to that reasonably necessary for the purpose. Much as with consent, many states believe that minimum necessary applies to disclosures to providers for treatment purposes (even though the HIPAA Privacy Rule explicitly exempts this specific purpose from the minimum necessary requirement). A number of business practices documented by the state teams show that minimum necessary was applied to such treatment disclosures even in emergency-related transfers of records, creating inappropriate barriers to otherwise necessary HIE. This area clearly requires education about and harmonization of what is reasonable, in order to reduce the variation in how the standard is applied.

A second set of issues involved the inconsistent application of (and lack of models and best practices for) minimum necessary in non–treatment-related disclosures, including payment, health care operations, public health, health oversight, and judicial and administrative proceedings. What one health care provider may determine to be minimally necessary may vary greatly from another's definition. In addition, several state teams reported that some stakeholder organizations apply the minimum necessary standard to uses (ie, internal disclosures) and others do not. With respect to uses, the HIPAA Privacy Rule requires a covered entity to identify those workforce members who need access to PHI and the categories of PHI to which such access is needed, and to make reasonable efforts to limit such access accordingly. This variability in the application of the minimum necessary standard may present a barrier to information exchange and to patient care.

A third set of issues is related to the burden of meeting the minimum necessary requirement in a paper-based environment. Some state teams reported that the federal requirement to limit HIE to the minimum necessary standard, where covered entities are involved and the standard otherwise applies, increases the time required for the exchange and affects the ability to receive comprehensive records for certain types of disclosures. Furthermore, the state reports indicate that they are unaware of current models for what minimum necessary for a given purpose consists of, that they believe current technology cannot limit disclosures to the minimum necessary, and that, as a result, processes that could be electronic must be manual. For organizations that use paper records, sifting through records to make sure that the minimum necessary standard is met is an onerous and inconsistent process. In addition, some state teams have noted that because the process is so burdensome and staff and resources are frequently limited, for payment-related disclosures some providers have reported a tendency to furnish payers access to the information the payer claims is necessary to obtain payment. And the HIPAA Privacy Rule allows for covered entities to rely, if such reliance is reasonable under the circumstances, on a requested disclosure as the minimum necessary for the stated purpose when the information is requested by another covered entity. The burden and inconsistency issues may be mitigated by the use of electronic systems. The state team reports indicate widespread agreement that current variation in the interpretation and application of the minimum necessary standard is a barrier to electronic health information exchange and that common understanding of what constitutes minimum necessary data sets, as well as who should receive them and under what circumstances, will be required for widespread interoperable electronic health information exchange.

3.2.2 Re-release or Redisclosure of PHI Obtained from Another Provider

Although the HIPAA Privacy Rule does not distinguish among the original sources of PHI held by a covered entity, except possibly to deny a patient's right to have his or her record amended if it "was not created by the covered entity," some state teams reported confusion about whether the rules for disclosing PHI that had been received from another provider were the same as or different from that generated "in house." Frequently, information from another provider is incorporated into an organization's internal medical records. However, some organizations limit the information incorporated into the record to information used in the course of treatment, while others incorporate all information provided.

The issue of redisclosure is another area where there is not a clear understanding among stakeholders about which state or federal regulation applies. A number of state teams reported that stakeholders were unclear whether a subsequent request for a patient's record should include the information obtained from the other organization. Many organizations reported that they would disclose only patient data that were collected by the organization. In other words, many providers believe that they cannot redisclose another provider's records. On the other hand, some organizations were concerned that specially protected information could be incorporated into the patient's record and then be released downstream without appropriate consent. Most state teams recognize that the misunderstanding around re-release and redisclosure is a source of variation that will need to be addressed to permit widespread interoperable electronic health information exchange.

3.2.3 Importance of Human Judgment Factor in Disclosures

As noted earlier, many issues related to inconsistency in practice and burden can be mitigated by moving to electronic management systems. In addition, many situations call for professional judgment or a reasonable decision to be made based on current circumstances. Several states raised the issue of perceived liability under these circumstances. Many state teams reported that fear of penalties and sanctions for violating the provisions of the HIPAA Rules creates an environment where staff interpret disclosure rules conservatively, which sometimes prevents or interrupts HIE, even in treatment situations.

3.2.4 Accounting of Disclosures

State teams consistently identified the issue of accounting for certain disclosures, required by the HIPAA Privacy Rule, as an unnecessary burden not consistently implemented by organizations and not well understood by patients and consumers. Entities that collect and maintain information about accountable types of disclosures expressed concerns about the ongoing resources, time, and effort being spent in documenting such disclosures so that, if patients or consumers request an accounting of disclosures, they can produce it efficiently and within the time required by the Privacy Rule.

In accounting of disclosures, providers and others report that (1) very few patients and consumers have exercised their right to such accounting, and (2) the type of disclosures recorded in a HIPAA-required accounting are not consistent with the disclosure information that consumers and patients seek when they request a copy of the disclosure list. Although this mismatch is not directly a barrier to electronic health information exchange, states consistently identified it as an issue that has created confusion and added burden to the process of health information management. The main issues include the following:

3.2.5 General Issues

State teams consistently reported that they continue to observe a general lack of understanding among providers and consumers about some of the basic tenets of the HIPAA Privacy Rule and how state laws interact with the Rule. Electronic systems can mitigate this source of variation and inconsistency in practice, but decisions will need to be made by stakeholders about how they want permissions for disclosures managed. State teams will also need to make decisions beyond permission for treatment in order to clarify how to manage disclosures to public health for legal and judiciary proceedings and for health oversight. In addition, state teams must decide how to manage the disclosure of information for health care operations and research.

State teams also raised issues related to the inconsistent way patient rights are administered across organizations, including the right to request an amendment to their health record, and the right to access and obtain a copy of their health information. It is clear that many health care consumers sign the forms without understanding their rights which is more an issue if education than an issue related to law or policy. Gray areas also exist in patients' rights and responsibilities about the data and the lack of standard procedures for handling breaches of privacy, the meaning of standards that address internal issues with procedures and personnel, and external effects on individuals and relationships with other entities.

The continued lack of understanding (or clarity in definition) around these various issues leads to fear of liability among entities and to conservative disclosure policies, consequently creating unnecessary and in some cases inappropriate barriers to electronic health information exchange.

3.3 Misunderstandings and Differing Applications of the HIPAA Security Rule

A review of state reports indicated some confusion and misunderstanding about appropriate security practices; it also indicated misunderstandings regarding what was currently technically available and scalable to the health care industry and consumers. This lack of knowledge, understanding, and trust among organizations and consumers was more evident in the business practices than in state laws. For the most part, state laws did not pose challenges to sound security, nor did the HIPAA Security Rule. Sometimes the matter was simply that, even though the Security Rule accommodates scalability in security programs, organizations voiced concern related to liability when one organization that believes its security program is robust sends PHI to another organization that it perceives as having a less robust security program.

The different types of security required by the HIPAA Security Rule were also sources of confusion. The Security Rule addresses administrative, physical, and technical security. Even though more than one third of the rule addresses administrative security requirements, many organizations focused more on needed technology than on administrative safeguards.

3.4 Security

3.4.1 Authentication and Authorization

A number of state teams identified the lack of standard authentication and authorization protocols as a barrier to electronic health information exchange, especially in more routine settings. Although authentication did not seem to be as great an issue when personal health information had to be exchanged for emergency reasons, it did represent a significant barrier to the exchange of personal health information for more routine purposes, such as the movement of a patient from one primary care physician to another or the sharing of personal health information with a specialist or hospital.

State teams noted that the lack of a common method for authenticating individuals created mistrust between organizations and reduced their comfort level with other organizations' standards or policies regarding who may authorize access to personal health information. Most of the concerns were raised about interorganizational exchange of personal health information, as opposed to intraorganizational processes for appropriate user authentication methods and standards.

The primary authentication and authorization issues were lack of standards and interorganizational mistrust. This section does not address the mistrust issues except to state that a commonly accepted set of standards regarding authentication and authorization would go far in alleviating mistrust.

Currently, for authentication some health care entities rely on phone calls or faxes from someone known to that entity while they impose stricter standards on other organizations, including the requirement that the consumer sign a consent form (although not necessarily required by law) before the PHI is exchanged. It becomes a cumbersome process that does not lend itself well to electronic health information exchange.

3.4.2 Inadequate Application-Level Data Access or Screening Controls

The state reports clearly indicate that many stakeholders are not using or are not familiar with currently available technologies. Those stakeholders that are either current users or who are exploring available technologies have identified as another critical issue current inadequacies in existing applications used to manage personal health information and used for HIE, including electronic health records (EHRs), data repositories, and the like. For example, some stakeholders indicated that they were required to print out copies of records from EHRs and redact specially protected information, or information that should not otherwise be disclosed, because the EHRs did not accommodate segregation of certain types of data. The current business practice is to print a paper copy, redact the information, and fax the redacted copy of the record to the intended recipient.

The perceived technological inadequacy stemming from the inability to appropriately segregate data was also identified as a challenge to appropriate role-based access, or to appropriate management of entities' access, to personal health information. In some cases, organizations are left with the decision to either permit internal access to excessive information or to withhold information to a degree sufficient to hinder the job duties of a member of an organization's workforce. This problem was reportedly associated with technical inadequacies and led to limiting or barring external parties' electronic access to appropriate portions of the consumer's health record. A number of the states are looking to technology vendors to address these perceived inadequacies.

3.4.3 Audit Programs

Several state teams indicated that the current lack of auditing capability because of technical inadequacies and nonexistent or poor audit programs was a challenge to electronic health information exchange, particularly when the management of community health records or HIEs was addressed.

This challenge is especially true when personal health information is shared across networks or between multiple entities, particularly regarding inadequacies in the current technical infrastructure to appropriately audit any user's access to, creation of, modification of, destruction of, or transmission of personal health information. Because community health records and the creation of HIEs are relatively new, robust standards and related audit log technology have yet to be developed.

Many applications currently used in the health care industry for transmitting or processing PHI do not include adequate audit log capability, especially so-called legacy applications (older applications built on what would be considered an outdated software platform). Several state teams raised concerns about the inability to track within their own applications external entities who may have accessed PHI stored in proprietary databases and in EHRs.

Moreover, some state teams indicated that, once again, a lack of trust exists between organizations where one organization perceives adequate audit processes have not been implemented by others. Adequate audit processes mean more than activating the appropriate audit logs; they include the development and regularly scheduled use of an appropriate audit program that addresses potential security risks and privacy risks and is based on an established set of audit criteria that match the organization.

3.4.4 Secure Transmission of Personal Health Information

Several state teams identified the secure transmission of personal health information between health care organizations, and between health care organizations and consumers, as a significant issue. Reports cited the lack of interoperable solutions and the high cost of implementing appropriate forms of secure transmission that protect the data in transit and protect against inappropriate interception and potential modification. It is more of a technical issue than an administrative security issue.

Concerns raised appear to be related to a lack of understanding of what is currently available on the market and the cost of such solutions. Many vendors serve small to large organizations, as well as consumers, and offer solutions that are scalable, affordable to small to large organizations, and interoperable.

3.4.5 Lack of a Sound Security Infrastructure

A number of the state reports addressed interorganizational security issues but did not examine barriers related to these issues (administrative, physical, and technical). Early on, the Technical Advisory Panel (TAP) noted a significant gap, especially in the provider community, between those organizations that have established sound security programs within their organization and those that have yet to meet the requirements of even the HIPAA Security Rule. Most reports addressed situations in which PHI moves outside their control, as opposed to situations within their control.

The lack of appropriate security program investment by health care and related organizations stems generally from 3 areas that should be reviewed and addressed at the organizational, state, and federal levels:

The fact that most state teams did not specifically address intraorganizational security issues per se demonstrates, in part, a lack of knowledge of appropriate security standards. The HIPAA Security Rule is scalable so that small to large organizations can appropriately implement sound security practices. Ultimately, interorganizational security solutions cannot be fully addressed if participating entities in an HIE have not established security programs that adequately protect personal health information managed by any participating entity. The lack of a sound security program represents a weak link in the exchange process.

One area addressed by the state teams was the potential cost of implementing appropriate security practices, the lack of infrastructure to support such practices, and other potential technical barriers (such as applications without audit logs, EHRs without the ability to partition data to meet minimum necessary standards, and the like). This area must be addressed, even though it is not within the scope of this project. The lack of a sound privacy and security infrastructure in a number of areas, and a lack of funding to create one, was a fairly common theme.

3.4.6 Variability in Administrative and Physical Safeguards

A number of state teams noted that the lack of adoption of consistent and appropriate administrative and physical safeguards within health care organizations has resulted in mistrust between organizations and increased concerns related to liability (where an organization with a sound security program transmits PHI to an organization that lacks a sound security infrastructure). As previously mentioned, most appropriate security measures fall within the administrative and physical realms.

This issue is not related to technology; rather, it involves lack of understanding about, or insufficient emphasis on, appropriate security for any size organization. Several state teams noted that such inconsistency resulted in barriers to electronic health information exchange and that a good part of the solution would be to address such inconsistencies or inadequate security programs through education and properly understood minimum standards sufficiently flexible to fit the needs of all sizes of health care organizations. Some would say that the Security Rule was designed to do just that—set minimum standards that are scalable. The state reports did not describe specific measures or processes thought to be lacking in the Security Rule, nor did the reports discuss what would make these organizations more comfortable than the existing Security Rule standards. For example, the problem could be a lack of standards, a lack of enforcement, or some combination. Some state teams alluded to accreditation as a potential solution.

State teams noted that reducing the variability in the application of administrative and physical security would do much to reduce certain challenges to electronic health information exchange, improve trust among organizations, and reduce liability concerns. It makes sense that an organization would be more willing to engage in electronic health information exchange with another organization if the exchanging organization had a higher comfort level and that the recipient had adopted adequate administrative and physical security safeguards.

3.5 Trust in Security

Trust, especially as it affects the potential viability of electronic health information exchange, was a critical issue raised in many of the state reports. Specifically, consumers and providers expressed concerns. Consumer concerns tended to focus on privacy risks arising from the implementation of new technologies and the potential for unauthorized disclosures of specially protected information to payers and employers. Providers were principally concerned about potential liabilities from the activities of other participants in electronic health information exchange and about consumers' lawsuits for inappropriate disclosures of their information; they were secondarily concerned about potential uses of information about consumers by payers and the government.

The review of trust issues was complicated by the fact that data on critical issues and business practices were not typically categorized under this heading and, in some cases, trust (or lack of it) may have been a motivating but unidentified reason for business practices. In a number of cases, stakeholders other than consumers (eg, providers) articulated their impression that consumer lack of trust was a critical issue, but no consumer data were provided. Ten of the reports lacked information that either expressly or by reasonable inference raised trust as a critical issue.

The leading trust issue was provider fear of lawsuits and liabilities associated with electronic health information exchange. This issue was identified by 10 reports and was based mostly on the fear of liability for errors or improper actions by other parties participating in HIE. One state identified trust (or lack thereof) as their single most significant issue, one that had been repeatedly raised, and the reason providers were not willing to participate in electronic health information exchange. Whether this fear has actually been validated by experience is unclear; however, one team identified as a concern a specific statute giving patients a cause of action for inappropriate disclosure, and another reported that HIPAA-based claims are being included in lawsuits by patients frequently enough that one provider had reported 6 such claims within the preceding 6 months. (The specific legal basis for such claims is not identified, and the HIPAA Rules do not provide a cause of action for individuals.)

The second most significant trust issue was consumer lack of trust, which appeared to have been expressed directly by consumers in 4 reports and was apparently an issue perceived by nonconsumer participants in 6 others. The principal basis articulated for this lack of trust was concern about payer and employer access and, secondarily, distrust of new technologies. It appears that one major reason for this lack of trust is the substantial number of security breaches that have been reported over the past few years, including several involving health care organizations.

The most significant general impression that arose from this review was that providers' trust concerns, in particular, appear to be directly correlated with HIE experience. In other words, providers in states with relatively few electronic health information exchange activities, or a briefer history of such activities, appear to fear they may be held liable or penalized for engaging in them and, in some cases, do not trust the technologies. Providers in states with more experience appear not to have such concerns or to have them to a lesser degree.

Finally, one noteworthy finding is that 2 states reported similar reliance on good faith and personal relationships in current practices and identified this reliance as a positive value that participants wished to preserve.

3.6 State Laws

The stakeholders identified a number of difficulties with the state laws governing privacy and security, including a general misunderstanding of the intersection of state laws and the HIPAA Rules, general confusion about where in the state code the law was found and how it was applied, and concern that when the law was readily identified and understood it was often too antiquated to apply sensibly to electronic health information exchange.

In fact, the leading issue was the absence of state laws clearly applicable to HIE (sometimes referred to as laws pertaining to regional health information organizations [RHIOs]), which was identified by 11 state teams. Ten state teams identified the generally confusing conditions of state laws as a critical issue, and 11 state teams reported the use of overly conservative business practices because of confusion or lack of knowledge about state laws. ("Overly conservative" in this context means more restrictive in information sharing than actually required by law.) At least 2 state teams noted that a number of stakeholders, particularly providers, were unaware of the need to comply with state laws more restrictive than the HIPAA Rules and were, in effect, treating the HIPAA Rules as a federal ceiling rather than a federal floor.

Beyond these general issues, the principal challenges identified involved lack of clarity surrounding the sharing of information with law enforcement (6 state teams), public health and bioterrorism reports (5 state teams), and confusion about minors' consent (5 state teams). Three state teams reported confusion about both genetics laws and electronic signatures.

One difficulty in reviewing these reports for state law awareness is identifying state laws that the participants may have entirely overlooked. For example, Scenario 3 included facts involving execution of an electronic signature. Although almost all states have some form of electronic signature statute and most have enacted the Uniform Electronic Transactions Act, this was not raised as a legal issue. Likewise, none of the reports discussed the possible implications or barriers raised by practices responsive to the security breach notification statutes now in effect in 17 of the reporting states.

The lack of awareness of and confusion about state laws not only raises risks for electronic health information exchange participants, but it may also cause them to overlook opportunities such as the liability limitations available under some state digital signature laws (Illinois, Utah, Washington) or useful principles available under other electronic signature laws. (Digital signatures are a specialized form of electronic signature.) Confusion about sharing information for law enforcement, public health, and bioterrorism purposes, in particular, appears to be a critical problem, given concerns about possible bioterrorism incidents, natural disasters, pandemic flu, and other mass crises. Current practices appear to rely heavily on goodwill, which is necessary but perhaps not sufficient, especially when interstate coordination is necessary.

The perception that most state laws need reform may present an opportunity to develop uniform (or at least consistent) HIE-related state laws. If so, this opportunity should be pursued promptly because legal reform may be one of the key solutions pursued by many of the reporting states. Unless an effort is made to coordinate such efforts, the various states may implement inconsistent reforms, perhaps resolving some of their own problems but raising new barriers to regional and national interoperation.

3.7 Networking Issues

This section is included because a number of state teams identified network issues as critical to health information networking and limitations that will result in barriers to electronic health information exchange. A common concern across states was the lack of well-defined, operational, and deployable models for regional networking. Significant concerns emerged among the state teams regarding, for example, the legal status of such organizations, their ability to legally operate HIEs, and their ability to store and maintain data. States were also concerned about the lack of uniform legal models and business practices for stakeholders to use after they joined a regional health network. Most state teams reported quite limited interorganizational exchanges of clinical information electronically for 3 reasons: (1) lack of implementation of regional networks, (2) limited deployment of EHR systems, and (3) lack of interoperability in those EHR systems that have been deployed. The electronic health information exchanges between organizations are limited mainly to content-specific clinical messaging in the areas of pharmacy/prescription drug information (e-prescribing), laboratory data, and radiology/digital imaging data.

Significant capacity gaps and variations exist in the levels of resources, technical capabilities, and financial means of organizations (ie, large versus small, urban versus rural). These gaps create significant variation in HIE practices among organizations; in turn, these variations in HIE practices limit or restrict the ability of organizations to conduct interorganizational electronic health information exchanges (lack of compatible systems, lack of compatible practices, lack of trust). State teams also noted that different types of electronic health information exchange (ie, provider-to-provider, provider-to-payer, payer-to-payer, and between others) require different handling: some will occur through true message exchanges, some will be done via "pull" mechanism, and others will be achieved with a "push" approach.

States also noted a high comfort level with existing paper-based and manual systems practices and processes for data exchanges. Many expressed the general belief among state participants that current manual practices are timely, are effective, and produce accurate data.

3.8 Linking Data from Multiple Sources to an Individual

The ability for a health care provider to identify the correct records for a patient is critical to clinical medicine and to electronic health information exchange. The lack of a standard, reliable way of accurately matching records to patients introduces the potential for inappropriate use or disclosure of personal health information from the wrong patient, which is both a clinical and a privacy risk. This risk is particularly acute when information is shared across institutions that use different methods of patient and record identification.

Patient and provider identification across organizations is required to

Recent developments in the area of personal health records have also advanced the need to establish a consistent and reliable method for linking patients to their records so that authorized providers and other users can locate the right information about the right patient.

Unique patient and provider identification was also discussed as part of the overall review of critical security issues. Identifying patients and providers appropriately is not only critical in the delivery of quality care to patients and for HIE, but is also a fundamental issue in other information security domains, such as authentication and authorization.

The variability in methods across organizations to link patients to records and the lack of agreed-upon patient-to-record matching standards to apply when interorganizational HIEs are conducted were perceived as major challenges by many state teams. These challenges were not the case in uniquely identifying providers across the health care system because new federal HIPAA regulations have now established a national standard unique identifier for health care providers (the National Provider Identifier, or NPI). Providers, payers, and others are required to fully implement the NPI by May 23, 2007. As enacted by Congress, HIPAA (the Act) provided for the creation of national unique patient identifiers; however, HHS and Congress have put the development of such a standard on hold indefinitely. In 1998, HHS delayed any work on this standard until after comprehensive privacy protections were in place. Since 1999, Congress has adopted appropriations language to ensure no appropriated funds are used to promulgate such a standard.

3.8.1 Types of Patient Identification Used

Current practices reported by participating stakeholders from most states pointed to the use by organizations of unique, asynchronous, and incompatible methods to establish the identities of their patients, enrollees, clients, and consumers. State teams reported instances, even within organizations, in which the same patient had been assigned more than one ID (eg, a patient's ambulatory or primary care clinic record vis-à-vis the same patient's inpatient or hospital record). Although this multiple assignment of ID is often caused by errors, such as spelling variations in names and transpositions of dates, some hospitals intentionally assign a different ID number to the same patient for each admission.

Given the lack of a national (or state) unique patient identifier, state teams discussed several alternatives for future use under organized regional networks to address the need for matching patients to their records across systems. One frequently cited mechanism is a record locator service. This type of service holds information that has been authorized by the patient and tells the system where authorized information can be found, but not the actual information the records may contain. It enables a separation of the function of locating authorized records from the function of transferring them to authorized users. Release of information from one entity to another is subject to authorization requirements between those parties; in certain specially protected treatment situations, patients or providers may choose not to share information. Record locator services are operated by multistakeholder collaboratives or exchanges and are based on a master patient index, a database that contains a unique identifier for every patient in a health care organization or system. The master patient index includes the medical center, outpatient clinics, practice offices, and rehabilitation facilities. All registration systems would use the master patient index to obtain patient information based on several identifiers.

A master patient index may employ deterministic indexing, in which searches are based on an exact match of the combination of name, Social Security number, date of birth, and gender. A master patient index may also use a rules-based searching mechanism (ie, perhaps using the first 4 letters of the last name or other key identifiers). A commonly used search mechanism is probabilistic matching that may or may not use a Soundex formula. Soundex coding helps to ensure that spelling variations are accounted for in the search.

A number of states have discussed the need to adopt the use of these mechanisms and systems and are debating the associated policy issues related to uniquely identifying patients across organizations as a foundation of the evolving HIEs.

3.8.2 Different Identification Systems: Common Challenges

States highlighted the following challenges associated with the variability and incompatibility of patient identification systems and approaches. These included the following:

Provider-related challenges included the need to access health information about a patient (residing in different systems) and the need to know all the unique identifiers assigned by those systems to the patient in order to access the information accurately and reliably.

Consumer-related challenges included the fact that consumers with health information residing at various organizations and in various systems are required to maintain different types of identifiers to access their information reliably.

3.8.3 Patient Identification: Consumer Communication and Education

Many state teams noted the need to engage consumers early and throughout the process of establishing such unique patient ID approaches, to help them buy into the proposed approaches, and to support any legislative and funding initiative necessary to support the implementation of the proposed methods.

The state teams were acutely aware of the potential increase in risk of privacy violations and identity theft, a risk increase brought about by any attempt to implement a unique patient ID across institutions or regions, and they were aware of the need to counter possible negative public reaction with effective security controls and extensive consumer education.

3.9 Interstate Issues

Interstate issues were typically raised by states for 3 reasons: (1) they had considerable sharing of health care information across state lines; (2) when the state experiences very large seasonal inflows of both out-of-state workers and tourists, its temporary residents make substantial use of out-of-state providers; and (3) a number of interstate health systems and plans have facilities and do business in the state. One markedly rural state noted that, because of its relative paucity of certain types of health care facilities, access to other states' hospitals and specialty services is crucial for its residents: any meaningful health information infrastructure would have to reach major metropolitan areas in 3 other states.

The legal variations noted as potential barriers to electronic health information exchange include differences in standards for genetic information; electronic prescriptions; immunization, HIV/AIDS, and minors' rights; minors' consents; workers' compensation; and mental health and substance abuse. In addition to interstate issues, at least one state team reported that variations between state and Native American tribal standards were critical to developing statewide HIEs. Several states noted that they did not believe interstate issues to be problematic and indicated that the disclosing state's law generally controlled the electronic health information exchanges. Most issues were among organizations rather than among states, and interstate issues tended to be resolved within organizations.

No state identified variations in security breach notification laws as an issue (although this important issue has been widely discussed in the past 2 or 3 years). Security breach notification laws have been adopted in at least 26 states, including 17 of the states reporting and 14 states adjacent to reporting states. The application of a state's law is triggered by a security incident, in electronic form, affecting health information about residents of the state, wherever the incident occurs. Organizations in states without security breach statutes are required to notify residents of other states with such laws if information about them has been affected. For example, in a notorious incident last year, the multistate Providence Health System experienced a security incident when electronic media were stolen in Portland, Oregon. Although Oregon does not have a security incident law, the organization was required to notify residents in several states that did, including the adjacent state of Washington.

3.10 Disclosure of Personal Health Information

The ability of one entity to disclose health information to another is at the core of the implementation of interoperable HIEs. Several federal and state laws and regulations, as well as specific program requirements, affect whether specific disclosures can take place and the way such disclosures can be achieved. Overall, state teams consistently identified the variation in business practices related to the disclosure of health information as a significant factor affecting the ability to conduct electronic health information exchange between organizations.

3.10.1 Interpretation of Requirements for the Re-release or Redisclosure of Health Information

One of the common challenges identified by state teams was the variability in the understanding of when health information can be re-released or redisclosed by an entity that received the information from another entity. Although this issue spans several scenarios, it was particularly noted in discussions of specially protected health information, such as mental health or substance abuse records.

Some states mentioned that the current paper environment is more conducive to preventing "unintended" redisclosures than a future EHR environment, although other states noted that the electronic environment was more capable of effectively controlling information that could or could not be disclosed.

3.10.2 Differences in How Specially Protected Health Information Must Be Treated

Almost all states highlighted as a major concern the differences in how certain health information (generally considered more sensitive than other types) must be specially handled when one is disclosing such information. In particular, the variability in the understanding, interpretation, and implementation of federal and state laws and program requirements results in more stringent protection of these data.

One concern noted by state teams was the creation of a dual standard for handling health information: the basic standard for all health information not considered relatively sensitive, and a more stringent set of requirements for specific health information considered sensitive. Examples of sensitive data include

In some cases, the additional requirements for protecting these types of data create the need to implement dual or separate patient consents, "per instance" consents when recurring disclosures are going to be needed, or even special re-release consents when a second provider is making the disclosure.

Other issues and concerns expressed regarding sensitive health information involved determinations about what is specially protected health information; specially protected information is usually defined by the provider on the basis of his or her understanding of the rule and the type of data being disclosed. Concerns about interstate exchange of specially protected information abound because of differences among states on the handling of specially protected information.

3.10.3 Issues of Ownership of Health Information

State reports also identified the lack of a clear and consistent definition of ownership of health information (and the variability in the interpretations of who owns the data) as a challenge to electronic health information exchange.

Most state teams reported that the HIPAA Privacy Rule did not address ownership and that state laws also lacked any specific references to the issue. Nevertheless, some state teams did identify specific state laws that defined ownership of medical records, although in many cases the state laws identified the provider who generated the record as the owner of the record while in other states the individual was considered to be the owner of the record.

3.10.4 Need for Fast, Easy, and Secure HIE Under Medical or Health Emergency Circumstances

State teams agreed on the need to ensure that, under emergency circumstances, health information will be able to be exchanged quickly, easily, and securely between and across providers, as well as across state borders. In the description of business practices related to the emergency circumstances scenario, many state teams noted confusion about when, how, and by whom a patient consent must be solicited for an entity to receive health information about the patient from other providers. States also expressed concerns about the minimum amount of data that should be exchanged in emergency situations, or whether all data should be accessible and available.

Additional concerns included specific state laws that might restrict the disclosure of certain information even in emergency situations without a proper patient consent, and challenges attributable to exchange of data across state borders when different state laws and regulations apply.

3.10.5 Variations in Interpretation of Reporting Requirements for Public Health Purposes

When dealing with reporting of health information to public health agencies, states reported the following issues:

3.10.6 Handling of Disclosures Related to Judicial Proceedings and Law Enforcement

The disclosure of health information in instances in which judicial proceedings and law enforcement are involved was also reported to have some variations as to when such disclosures may occur, how they can be achieved, what specific requirements must be met for providers and others to be able to make the disclosure, and whether a patient must consent to such disclosures (even though the HIPAA Privacy Rule permits such disclosures, subject to certain conditions, without patient authorization).

In most cases cited by state teams, the determination of whether a particular disclosure could be made to law enforcement followed strict parameters and business practices. Most states also had laws that required either patient consent or a court order for such disclosures. The issues identified by states related to whether front-line staff dealing with such situations were appropriately trained on the implementation of the business policies and procedures established by the organization for this type of disclosure.

3.11 Cultural and Business Issues

States referenced cultural and business issues that pose challenges to electronic health information exchange. One example is concern about liability for incidental or inappropriate disclosures, which causes many stakeholder organizations to take a conservative approach to developing practice and policy. Another example of a business issue that poses a challenge is general resistance to change, a common issue that organizations face whenever a change in business causes a work flow process to change. Such resistance is frequently cited as a cultural issue in discussions about decisions to adopt electronic systems. Some individuals within organizations are comfortable with existing paper-based or manual systems and data exchange practices and processes, and they believe that current manual practices produce accurate data and are timely and effective. Implicit in some discussions is an assumption that security slows down the process: the data are secure but are not transmitted as fast as they can be with a quick phone call. In fact, most data exchanges take place via person-to-person contact, especially in emergency situations, and human judgment plays a large role in how and when information is exchanged. It will be critical to include these points at which human judgment is required in the specifications for any system developed to exchange information.

A third business issue that cuts across all the scenarios and domains is the need for clear definitions of terms within state and federal laws. For example, terms like medical emergency, current treatment, related entity, and minimum necessary do not have agreed-upon definitions and, therefore, increase variation as organizations attempt to meet compliance by defining terms in ways that protect the interests of the organization. The term health record is a good example: organizations disagree about whether or not a patient's demographic data and a pointer to the location of a patient's health information constitute a health record.

One example of a cultural and business issue involves the tension among health care providers, hospitals, and patients concerning who controls or owns the data. A number of providers indicated that they did not think that patients should have full access to their records, especially to doctors' notes. They were concerned that providers would not enter complete notes if patients had access to them. Although the Privacy Rule provides patients the right to access their medical records, the stakeholders who raised this issue either appear to be unaware of that provision, or are not HIPAA covered entities. Liability was also a concern. However, the majority of stakeholders agreed that, to be successful, electronic health information exchange must be designed to address patients' needs, interests, and concerns.


4. REVIEW OF STATE SOLUTION IDENTIFICATION AND SELECTION PROCESS

The process of developing solutions required each state project team to review barriers to private and secure electronic health information exchange and select a subset of issues to address based on an assessment of impact. At the same time, state project teams were to review best practices (those that protect privacy and facilitate interoperability) for possible statewide adoption. Work groups would then meet with relevant stakeholders and develop solutions. For each proposed solution, state teams were asked to discuss the issue or problem that the solution was intended to resolve, the relevant domain area, the specific type of use or disclosure, and the relevant stakeholder groups. State teams were also asked to describe how their proposed solutions had been vetted, evaluated, and prioritized, and whether each solution had been tested, partially implemented, or was in use by a limited set of stakeholders. State teams needed to assess the feasibility of each proposed solution or recommendation and were asked to consider the structural, legal, legislative, and economic impediments to implementation.

4.1 Solutions Work Group Formation

Nearly all state teams made a conscious effort to ensure continuity between the assessment stage and the solutions stage by including members of their Variations Work Group (VWG) and Legal Work Group (LWG) in their Solutions Work Group (SWG) and then adding key resources through targeted recruitment. The teams noted that the composition of the SWG often evolved through time, depending on the knowledge and experience required to address specific barriers. Two state teams reported carrying the notion of continuity further by merging their SWG with their Implementation Planning Work Group (IPWG). Table 4-1 summarizes the makeup of the SWGs across the 34 states. Each state team submitted a table reporting stakeholder group membership in work groups and participation through outreach. The tables submitted by the state teams made it possible to summarize stakeholder group participation consistently and accurately.

Table 4-1. Stakeholder Group Representation of Solutions Work Group Members
Stakeholder Group States Including Stakeholder Group
in Solutions Work Group Membership
(N = 34) (%)
Technology and health information experts 33 (97%)
Privacy and security experts/compliance officers 28 (82%)
Health IT consultants 25 (74%)
Electronic health records experts 21 (62%)
Technology organizations/vendors 19 (56%)
Health information management organizations 17 (50%)
Quality improvement organizations 17 (50%)
Regional health information organizations 15 (44%)
Other health data and technology experts 5 (15%)
Public health agencies or departments 32 (94%)
Providers 32 (94%)
Hospitals/health systems 31 (91%)
Physicians and physicians groups 28 (82%)
Clinicians 27 (79%)
Professional associations and societies 23 (68%)
Community clinics and health centers 20 (59%)
Mental health and behavioral health 18 (53%)
Pharmacies/pharmacy benefit managers 15 (44%)
Emergency medicine 11 (32%)
Long-term care facilities and nursing homes 10 (29%)
Homecare and hospice 9 (26%)
Laboratories 9 (26%)
Federal health facilities 8 (24%)
Safety net providers 8 (24%)
Other health care providers 6 (18%)
Legal counsel/attorneys 31 (91%)
Other government 26 (76%)
Medicaid/state government except public health 24 (71%)
County government 6 (18%)
Consumers 26 (76%)
Consumer organizations and advocates 21 (62%)
Individual consumers 19 (56%)
Medical and public health schools/research 25 (74%)
Payers 25 (74%)
Employers 12 (35%)
Law enforcement and correctional facilities 7 (21%)
Other 5 (15%)
Foundations/other policy consultants 1 (3%)

Each category row (in bold typeface) summarizes the results for the related subcategories reported in the rows immediately below it. Not all categories required subcategories. For example, of the 34 state SWGs, 33 or 97% included technology and health information experts as members, and the number of state teams that included each specific type of expert is reported in the 8 subcategory rows that appear immediately below this row in the table. On average, membership of state SWGs included 8 of the 11 bold categories of stakeholder groups and 17 of the 34 more specific stakeholder groups. (Categories that do not have subcategories are treated here as specific groups.) Technology and health information experts were most frequently cited as members of SWGs. From 90% to 95% of the teams also included public health agencies, providers, and attorneys. About three fourths of the SWGs included other government, consumers, medical and public health schools/research, and payers.

State teams also reported on the stakeholder groups that participated in solutions development and evaluation through outreach (see Table 4-2). Providers, technology and health information experts, and payers were the most frequently reported stakeholder groups participating in solutions analysis through community outreach.

Table 4-2. Stakeholder Group Engagement in Solutions Development and Evaluation
Stakeholder Group States Engaging Stakeholder Group
Participation in Solutions Analysis through
Community Outreach
(N = 34) (%)
Providers 30 (88%)
Physicians and physicians groups 30 (88%)
Hospitals/health systems 28 (82%)
Clinicians 27 (79%)
Professional associations and societies 22 (65%)
Mental health and behavioral health 18 (53%)
Pharmacies/pharmacy benefit managers 16 (47%)
Community clinics and health centers 15 (44%)
Long-term care facilities and nursing homes 14 (41%)
Emergency medicine 13 (38%)
Homecare and hospice 11 (32%)
Federal health facilities 10 (29%)
Laboratories 8 (24%)
Safety net providers 8 (24%)
Other health care providers 8 (24%)
Technology and health information experts 29 (85%)
Health IT consultants 23 (68%)
Privacy and security experts/compliance officers 22 (65%)
Quality improvement organizations 20 (59%)
Electronic health records experts 19 (56%)
Regional health information organizations 17 (50%)
Technology organizations/vendors 15 (44%)
Health information management organizations 14 (41%)
Other health data and technology experts 4 (12%)
Payers 28 (82%)
Public health agencies or departments 27 (79%)
Medical and public health schools/research 25 (74%)
Legal counsel/attorneys 25 (74%)
Other government 25 (74%)
Medicaid/state government except public health 25 (74%)
County government 5 (15%)
Consumers 23 (68%)
Consumer organizations and advocates 21 (62%)
Individual consumers 14 (41%)
Employers 14 (41%)
Law enforcement and correctional facilities 7 (21%)
Other 2 (6%)
Foundations/other policy consultants 1 (3%)

4.2 Process Used to Identify and Propose Solutions

All state teams described an iterative process of solution development, review, validation, and refinement. The overall process usually involved meetings at which barriers were reviewed and categorized, brainstorming sessions for developing solutions, followed by targeted outreach to the stakeholder community for additional input.

Materials were often prepared and distributed prior to meetings. These materials described the background of the study (for participants who had not participated previously), the barriers that had been identified, key topics and issues, and in a few instances, a set of preliminary solutions that had already been developed by the core team.

Meetings were held in person whenever possible, with some members participating by telephone. Additional input was collected via the Agency for Healthcare Research and Quality (AHRQ) National Resource Center portal, by e-mail, and by interviewing key stakeholders. A few state teams reported using Webex meetings during solutions development, and 2 states used surveys to collect proposed solutions from stakeholders.

One key challenge was to reduce the task to a manageable size. Nearly all states sorted barriers into categories by domain, by cluster of domains, or by topic area. Many teams used the topic area categories developed by RTI for the regional meetings. This categorization allowed teams to focus on barriers that tended to cluster and offer wide impact through broad application. Teams usually reduced the task further by breaking the SWG into smaller subgroups assigned to specific topic areas or categories. These smaller subgroups met, brainstormed solutions, and reported back to the larger group. Solutions development usually required a series of meetings to complete the process of review, validation, and refinement. Additional approaches included identifying root causes and developing use cases to test solutions.

4.3 Process Used to Vet, Evaluate, and Prioritize Solutions

Nearly all state teams described a vetting process that involved review by the SWG, the LWG, the steering committee, the broader stakeholder community, and key government officials. The process established regional health information organizations (RHIOs). In a few states, evaluation and prioritization activities continue to be reported as planned rather than having occurred by the report date. State teams reported a number of ranking, scoring, and weighting methods for seeking consensus during priority setting. One state prioritized solutions, reporting that they first eliminated those they considered not feasible and then ranked the remaining solutions based on ease of implementation, resources required, technological feasibility, comportment with the current legal and regulatory environment, and the readiness of the affected stakeholder community to adopt the solution. Evaluation criteria mentioned in other states included impact on consumer protection and privacy, relationship to national standards, timing, and compatibility with pilot testing. SWG participants in one state submitted ballots via e-mail, which allowed them to rank solutions and narrow their focus. Another state team reported their plan to test their solutions through use cases and the need to align their priorities with other state projects.

4.4 Determination of Feasibility

In most states, preliminary determination of the feasibility of solutions was based on an evaluation of cost, ease of implementation, and time required for implementation. One state team noted that the most feasible solutions are those that can be implemented without new technological development and do not require substantial modification of existing laws and regulations. One state team reported that they tested feasibility through a discussion of solutions currently in use, potential alternatives, outcomes and constraints associated with alternative solutions, cost, implementation strategies, and best practices. Another state team's feasibility criteria included economic, technical, organizational and cultural, time, and the level of participation required.


5. ANALYSIS OF STATE PROPOSED SOLUTIONS

State solutions were organized into 5 general categories according to the needs that they addressed: practice and policy; legal and regulatory; data standards; education and outreach; implementation and governance; and ancillary issues (such as funding and incentive for electronic health record [EHR] adoption). Within each subsection, solutions were clustered according to the specific issue that they address.

5.1 Reducing Variation: Practice or Policy Solutions

5.1.1 Interpreting and Applying the HIPAA Privacy Rule

The Privacy Rule is frequently cited as limiting exchange, even though it allows the exchange of information, without consent or authorization, for the purposes of treatment, payment, and health care operations, among other purposes.10 Three key issues have been raised by the state teams in regard to the Privacy Rule. First, providers may genuinely misunderstand the law and how and when it applies: at least 3 state teams observed misunderstanding to be more common among small physician practice groups or individual providers, who often do not even know if they are covered entities and, if they are covered entities, may not have access to legal counsel. In addition, office staff members may not be properly trained, and may follow different protocols when releasing information. Second, some payers or providers may use the law as a shield to even permitted disclosures in an effort to protect proprietary information. Third, many providers fear sanctions for inappropriate disclosures and adopt a conservative stance toward exchange to protect their organizations from prosecution or civil penalties. 11  Thus, although the Privacy Rule allows exchange under many circumstances, it is a convenient excuse for ignorance, for a desire to retain proprietary information, or for fear of liability.

In many instances, state law is more restrictive than the Privacy Rule. The Privacy Rule serves as a federal floor with respect to privacy protections, rather than a ceiling, and does not preempt state laws that offer more protections. The state teams have identified the need to review many of the more protective state laws to determine whether they will apply sensibly to the electronic exchange of health information. Some of these laws may pose barriers to exchange because they were enacted on the basis of requirements for paper-based exchanges. For example, a state law that requires a wet signature poses a barrier to electronic health information exchange. State teams will need to work through a solution that fits the rationale behind the wet signature law to permit electronic exchange and maintain the appropriate protections as determined by the stakeholders.

State teams offered a variety of solutions aimed at reducing variation resulting from differing interpretations and applications of the Privacy Rule and the minimum necessary standard. Solutions included standard policies or policy guidance, standard documents, Privacy Rule education, and requests for clarification regarding certain Privacy Rule requirements from appropriate authorities.

The HIPAA Privacy Rule states that "a covered entity must make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request." However, the minimum necessary standard does not apply to disclosures to or requests by a health care provider for the purposes of treatment or use or disclosure that is required by law. However, some providers are extending the minimum necessary standard to treatment disclosures, which presents a challenge and may also harm patients if information is not provided promptly or is incomplete. Providers may also have technical difficulties in extracting the information from records. One state sought to address the standardization of the application of the minimum necessary standard and the medical need to know (a term governing the disclosure of HIV/AIDS information) by including specificity for read and write access in the exchange of personal health information. Nine states specifically referenced the minimum necessary standard and offered solutions to remedy misunderstandings and differing applications related to the standard.

Issue: Providers do not understand when the minimum necessary standard applies.

Solution: Create standard policies and procedures and training regarding use and disclosure of health information in accordance with the Privacy Rule and state law.

Solution: Identify standards to address limiting data to the minimum necessary for requested purposes.

Solution: Adopt statewide health information exchange (HIE) standards/protocols to define uniform cross-enterprise digital documents/content to represent routine health care exchanges and noncare exchanges.

Solution: Develop consensus model documents regarding clear definitions of terms relevant to sharing information, such as minimum necessary.

Solution: Clarify and standardize minimum necessary data sets by role of accessing party, use situation, or both.

Issue: Providers may have technical difficulties in applying the minimum necessary standard.

Solution: Design a more sophisticated and systematic means of providing access to the minimum information required in hospital information systems.

In addition to state-level solutions, 5 state teams requested federal guidance related to the Privacy Rule to reduce misunderstanding and promote common application. Two state teams suggested that the minimum necessary requirement be reviewed and that the US Department of Health and Human Services (HHS) should develop updated and more detailed guidance to clarify when and how the standard should be applied. The other 3 teams called for more general guidance regarding the Privacy Rule, including a compilation of frequently asked questions on the application of the Privacy Rule and additional explication of the extra protections afforded to psychotherapy notes (see Section 6 for additional discussion on requests for federal guidance). Other options for addressing variation related to the interpretation and application of the HIPAA Rules include educational programs, development of standard policies and protocols, and model documents.

Eighteen state teams proposed offering a training program to promote common understanding of the Privacy Rule overall and the minimum necessary standard specifically. The proposed programs varied in their intended audience, content, and scope. State teams recommended Privacy Rule training for providers and other office personnel, payers, consumers, law enforcement, public health officials, and first responders. These groups all require access to protected health information (PHI) but may not be fully aware of covered entities' responsibilities under the Privacy Rule, particularly those who need access to PHI relatively infrequently. Training for providers was designed to ensure that providers understood the relevant state law and Privacy Rule requirements. As one state team succinctly put it, "The purpose of provider education is to avoid unnecessary barriers to sharing personal health information over networks due to misunderstandings of the HIPAA Privacy and Security Rules and state privacy law."

Issue: Providers and office personnel do not have a clear understanding of what the HIPAA Rules and state law require, or vary in application of such requirements, resulting in broad variation that creates a barrier to electronic health information exchange.

Solution: Formulate a general, state-mandated HIPAA training course detailing what is required by the HIPAA Rules and other state laws.

Solution: Educate health care organizations about the inconsistent application of the HIPAA Rules and how that variation affects health information exchange.

Solution: Have the state health department issue policy guidance clarifying that personal health information may be shared in an HIE after a general release supplemented by notice giving patients ample opportunity to object to participation, where the HIE discloses only the health information to providers for the purpose of treatment.

Nine state teams recommended educational programs for consumers. If consumers are better educated about the value of information exchange and understand existing legal protections, they may be more likely to allow information to be exchanged electronically. Educating consumers offers an opportunity to increase support for electronic health information exchange and improve trust. Some state teams also felt that consumers did not have an adequate understanding of their rights and responsibilities in an electronic health information exchange environment, and proposed educating consumers on these points.

Issue: Consumers are unaware of legal protections.

Solution: Educate consumers regarding legal protections, rights, and responsibilities to increase trust in electronic health information exchange.

Finally, state teams proposed educational programs for law enforcement officials, public health officials, and first responders. Although the Privacy Rule allows disclosures without consent or authorization to these individuals under various circumstances, confusion still existed at the state level as to what disclosures were allowed, and under what circumstances. Both health care providers and potential recipients of personal health information may be confused as to what sharing is allowed. To address this, 4 state teams proposed providing training for law enforcement and public health officials.

Issue: Law enforcement officials, public health officials, and first responders often need to access personal health information. The circumstances under which they may access personal health information without authorization are not understood.

Solution: Offer training for law enforcement officials, public health officials, and first responders.

Solution: Enhance communication with other state agencies, such as the department of public health, that frequently require access to personal health information.

State teams also proposed drafting model documents or policies for the exchange of personal health information. Suggested model documents included business associate agreements (BAAs), notices of privacy practices (NPPs), and other nonspecified documents. Standardized documents may increase HIE participants' confidence that they are complying with the HIPAA Rules and relevant state law. Offering standard agreements may decrease the effort required to initiate exchange. Another source of variation is that persons may not understand if and when they should sign an agreement, particularly a BAA. Although this is outlined in the HIPAA Privacy Rule, confusion persists. Issuing guidance, or including this information on the model BAA, may help reduce this confusion. Standardized language or documents may reduce fear of liability, especially if they receive broad acceptance and are compliant. Since many different documents already exist, state teams may be able to analyze and standardize a boilerplate document that complies with relevant state and federal laws.

Issue: Exchange participants are not confident that forms comply with relevant state and federal law.

Solution: Provide model or standardized documents (9 states).

Issue: Exchange participants may not understand when a contract or other legal agreement is required.

Solution: Educate providers as to when an agreement is required (2 states).

States have introduced a variety of strategies for reducing variation stemming from differing interpretations and applications of the HIPAA Privacy Rule, ranging from educational program to standardized documents, to policy guidance and clarification of terms. See Section 5.2 for additional discussion on options for addressing variation stemming from state law and the intersection of state and federal law.

5.1.2 Uniform Consent

Uniform consent is another mechanism for reducing variation and was addressed in some form by 13 state teams.12 State teams proposed 3 general designs for consent documents. States may choose a uniform consent form to be used by all entities within the state. A second option is to offer standardized consent forms that include certain elements, but may be modified based on institutional preferences. A third option is to provide model forms and allow institutions to draft their own forms. Payers or providers may be reluctant to exchange information if they are not confident in the standards and procedures maintained by others. Model consent forms may reduce these fears.

Issue: Consent forms and procedures vary.

Solution: Implement uniform, standardized, or model consent forms (13 states).

While all 3 design options may reduce liability concerns, each offers challenges. A uniform consent form, recommended by 3 state teams, may be politically unfeasible, as it requires consensus among a wide range of participants. Standardized consent forms were mentioned by 5 states, and model forms by 3 state teams. One team was still exploring the challenges and benefits of these 3 types of solutions. Standardized consent and model forms may be more feasible, although they must offer sufficient consistency if they are to improve HIE. In addition to offering forms, one state recommended providing consent criteria, which may be less controversial, but still offering exchange participants a greater degree of confidence. As noted above, many model documents exist, so states do not face the challenges of starting from scratch to develop model forms.

5.1.3 Policies to Govern Interstate Exchange

Several state teams have already initiated contact with neighboring states to examine the issue of interstate exchange. Outreach and collaboration efforts have begun in a variety of regions including New England, the Pacific Northwest, the Middle Atlantic, and Midwest. Although state teams frequently indicated a desire for national standards or policies for interstate exchange (see Section 6, National-Level Recommendations, for additional discussion), they recognize that federal standards may not be forthcoming and are pursuing state-level options. Concerns expressed by state teams include a lack of policies to govern interstate exchange, particularly in emergency situations, varying levels of protection and requirements, and different state-level patient identity management systems.

Issue: Lack of policies to govern interstate exchange.

Solution: Develop a task force to examine interstate exchange issues (2 states).

Solution: Establish compacts or memoranda of understanding with neighboring states for HIE purposes (2 states).

Issue: Lack of exchange policies for emergency situations.

Solution: Collaborate with neighboring states and territories to resolve cross-border issues.

Solution: Create a plan for addressing the sharing of patient health information between states in the event of a natural or manmade disaster resulting in patients being displaced.

Issue: State laws vary in levels of protection and requirements.

Solution: Attempt to harmonize laws across states.

Issue: States may develop different patient identity management systems.

Solution: Research and propose options on a system of patient identification that will allow speedy and convenient acquisition of information across jurisdictional lines.

The teams have had an opportunity to meet and discuss these issues, which resulted in collaborative efforts that will enhance interstate exchange.

5.2 Legal or Regulatory Issues

5.2.1 State Laws: Finding and Interpreting Them

Finding and interpreting state laws can pose a challenge. Law pertaining to privacy may be scattered throughout multiple chapters of a state's code, be inconsistent with other state and federal laws, or be overly vague. Similarly, case law is scattered and may also be inconsistent or contradictory. This situation can make it difficult for stakeholders to determine which laws apply to them and under what circumstances. State teams proposed 3 general solutions to enhance understanding: creating an advisory committee, consolidating state law, and aligning definitions in state law with those in the HIPAA Rules.

Issue: Stakeholders misunderstand state law.

Solution: Create an advisory committee to offer guidance on state law (8 state teams).

Issue: State law is scattered, inconsistent, or contradictory, impeding consistent interpretation and understanding.

Solution: Consolidate state code into a single chapter (5 state teams).

Solution: Develop a compendium of relevant state law, case law, federal law, and analysis.

Issue: Definitions in state law are not consistent with definitions in the HIPAA Rules.

Solution: Amend state law to mirror definitions in the HIPAA Rules (9 state teams).

5.2.2 State Law Governing Secure Exchange of Health Information

In many instances, state law governing the privacy of personal health information did not anticipate electronic exchange of information and, thus, does not sensibly apply to electronic health information exchange. Privacy laws may also not have anticipated other advances, such as genetic testing for certain diseases or changes in mental health treatment options, and definitions in existing statutes may be unclear. In either case, states have the option of amending or updating existing law, or drafting new law. The solutions immediately following were generally phrased but often included references to relevant state statute.

Issue: State law does not sensibly apply to electronic health information exchange.

Solution: Draft new state laws to govern electronic exchange (6 states).

Solution: Update existing state privacy laws to include electronic exchange (9 states).

In addition to the more general updates to state law mentioned above, the majority of states proposed amending state law more specifically. Possible amendments to state law or new legislation often dealt with the management of specially protected information or HIEs. Seven state teams proposed new laws related to specially protected information. Although definitions of specially protected information depend on state statute, they generally include HIV/AIDS information, mental health information, substance abuse treatment information, and genetic testing results. Three state teams sought to clarify the legal status of an HIE.

Issue: Specially protected information is inadequately defined.

Solution: Statutorily define specially protected information and create policies and procedures for how it is to be handled.

Issue: The legal structure for HIE authority and liability is not established.

Solution: Draft legislation to address the legal status of an HIE, including authority and liability.

Amending specific statues will be easier to accomplish than drafting an entirely new set of privacy laws. State teams noted the prudence of this limited approach, explaining that it allowed for the most pressing problems to be remedied and limited the possibility that the changes will create more problems than they solve. Although state teams did not specifically address implementation in their final Assessment of Variation and Analysis of Solutions (AVAS) reports, 2 state teams mentioned drafting policy briefs to inform legislators and to begin to build support for this process.

Liability was another key issue that emerged in the AVAS reports. Payers and providers may be wary of electronic health information exchange if they feel it opens them to greater risk. Although there are liability concerns with paper documents, the chance of a large-scale breach is more likely in an electronic environment. Another perceived challenge posed by electronic records is the possibility that a patient's records would be aggregated, and that, absent a national patient identifier, the information in the record might not apply to the patient currently being treated. Electronic records may give patients more control over what information is disclosed (within the limits of technology). Some stakeholders voiced the concern that if patients are more selective in choosing to disclose information, physicians may not be able to provide the best treatment, which may also generate liability concerns if the patient is harmed as a result.

Nine state teams addressed the issue of liability by proposing new state laws. Limitations on liability were frequently tied to technical standards. That is, if a participant in a health information exchange complied with certain technology standards, liability would be limited (see Section 6.3 for additional discussions of technology standards). Legal professionals or patient advocacy groups may resist caps on damages or other limits. State teams will likely have to make a case that the benefits of improved exchange, such as improved quality of care, outweigh the disadvantages of those legal protections. One state also addressed the issue of who (the disclosing or receiving provider) is liable if inappropriate information is disclosed. Finally, one state team recommended that the HIPAA Rules include safe harbors (see Section 6, National-Level Recommendations, for additional discussion of national recommendations).

Issue: Providers are unwilling to participate in an HIE, because of liability concerns.

Solution: Draft state law limiting liability of exchange to participants meeting certain technical and policy standards (7 states).

Solution: Offer standardized agreements that conform to state and federal law (9 states).

Issue: Liability rests solely with the disclosing provider.

Solution: Amend state law so that either the disclosing or receiving provider may be liable, depending on each entity's conduct.

Enforcement was a final key issue in the state AVAS reports. As mentioned above, state privacy laws frequently did not anticipate electronic exchange of information; thus, no specific penalties deal with electronic health information exchange. The issue of enforcement is closely tied to liability, but also to consumer trust and education. Consumers are also more likely to trust a system where they know that those who disclose information inappropriately will be held accountable. In addition, consumers must be aware of their rights and responsibilities to seek redress. One state team planned to develop a dispute resolution process, anticipating the need for mediation and sanctions. Another 5 state teams mentioned the issue of enforcement.

Issue: State law does not sufficiently address the issue of enforcement.

Solution: Draft new state law to create new penalties and enforcement mechanisms for unauthorized disclosures (6 state teams).

5.2.3 Intersection of State and Federal Regulations (HIPAA Rules, 42 C.F.R. pt. 2, CLIA Rules)

The intersection of state and federal law offers significant challenges. The HIPAA Privacy Rule serves as a federal floor rather than a ceiling, for privacy protection, and many state laws are more protective than the Privacy Rule. In addition to the Privacy Rule, states must also comply with 42 C.F.R. pt. 2, which governs drug and alcohol abuse treatment records, Medicaid regulations, the Clinical Laboratory Improvement Amendments (CLIA), and the Family Educational Rights and Privacy Act (FERPA). These federal regulations are overseen by different agencies, a regulatory framework that requires the creation of crosswalks to explain where given provisions apply. Even finding and interpreting state law can be a challenge; layering on federal regulations makes legal analysis all the more complicated.

State teams generally recognized that changes to federal law were unlikely, although such changes may have been their preference (see Section 6, National-Level Recommendations, for recommendations of changes to federal law). Absent federal changes, states proposed alternative solutions to improve HIE. As discussed in the previous section, 9 state teams proposed aligning state law with the HIPAA Rules to make definitions consistent between state and federal law, thereby reducing ambiguities and improving the foundation for HIE. Additional issues presented by the state teams include the following:

Issue: Providers are unaware of all relevant state and federal law.

Solution: Create and maintain an index of state and federal law that applies to HIE privacy and security.

Issue: Preemption analysis may be out of date.

Solution: Update preemption analysis to include recent updates to state and federal law (3 states).

Title 42 C.F.R. pt. 2 also posed challenges for state teams and health information exchange: it governs drug and alcohol abuse treatment information and is intentionally restrictive; it was not designed to facilitate the flow of information, but to protect the privacy of individuals seeking substance abuse treatment. There are narrow exceptions as to when disclosure of information without consent is permissible, and treatment (outside of an emergency) is not among them. As discussed in Section 6, National-Level Recommendations, several state teams called for an amendment of 42 C.F.R. pt. 2, usually for allowing the release of information for treatment purposes without consent. States continue to struggle with this issue, attempting to balance privacy concerns and obstacles to HIE.

CLIA and FERPA were not widely addressed, although one state team developed possible amendments to CLIA to expand the list of permissible recipients of laboratory testing results. Another state team recommended aligning FERPA with other federal privacy laws (again, see Section 6 for additional discussion).

Issue: CLIA narrowly limits the individuals authorized to receive clinical laboratory test results directly from laboratories.

Solution: Amend CLIA to expand the list of permissible recipients.

Finally, state teams addressed the issue of Medicaid. Federal statutes and regulations require that disclosure or use of Medicaid data concerning applicants or recipients must be limited to "purposes directly concerned with administration of the plan."13 Medicaid plan "administration" is narrowly defined and only includes determining eligibility and amount of assistance, providing services to recipients, and conducting or assisting with investigations, prosecutions, and civil and criminal proceedings related to administration.14 In addition, information concerning Medicaid applicants or recipients may be shared only with persons who are subject to standards of confidentiality that are comparable to the Medicaid confidentiality standards. These restrictions apply to all requests for information from outside sources, including other governmental bodies. These restrictions make it difficult for Medicaid and non-Medicaid providers to share information, and also inhibit sharing information between states' Medicaid agencies and other state agencies.

New challenges arise when considering the possibility of changes to the Medicaid benefit package. One state team has secured an amendment to its state Medicaid plan that allows it to offer different benefit packages to recipients if they comply with certain responsibilities, such as routine screenings, medication compliance, and keeping scheduled appointments, detailed information that previously had not been reported to the plan. This amendment requires physicians to report whether patients are meeting those responsibilities. Although the privacy implications of these decisions have not been fully explored, the state believes that such reporting is directly concerned with administering the plan. In addition, other states may decide to similarly amend their Medicaid plans or seek other waivers under the Deficit Reduction Act (this does require approval from the Centers for Medicare & Medicaid Services). The state that has secured an amendment to its Medicaid plan is exploring the implications of the amendment and working to ensure that beneficiaries' information is appropriately protected.

Issues resulting from the intersection of state and federal law can be addressed at either level. The solutions described above apply to those that can be implemented at the state level, while federal recommendations are discussed in Section 6.

5.3 Technology and Standards

In the assessment of the variation process, state teams captured details about the confusion and misunderstanding among stakeholders concerning appropriate security practices. Stakeholders frequently misunderstood what standards and practices were technically available and scalable to the health care industry and consumers. This lack of knowledge, understanding, and trust among organizations and consumers was more evident in the business practices than in state laws. For the most part, state laws did not pose challenges to sound security, nor did the HIPAA Security Rule. Sometimes the matter was simply that, even though the Security Rule accommodates scalability in security programs, organizations voiced concern related to liability when one organization that believes its security program is more robust sends personal health information to another organization with a perceived less robust security program.

Confusion also exists regarding the different types of security required by the HIPAA Security Rule. The Security Rule addresses administrative, physical, and technical security. Even though more than one third of the rule addresses administrative security requirements, many organizations focused more on needed technology than on administrative safeguards.

Thirty-one of the 34 state teams offered solutions to the technology-related issues defined by the stakeholders throughout the course of the project. The level of specificity in the solutions presented by the state teams varied widely, from general statements that certain technological issues would need to be resolved to very specific and detailed discussions of how to resolve very specific issues. For example, one report provided 173 specific, detailed solutions covering 20 technical issues that were encountered while working to create the HIE program in the state. Another state team developed a set of 19 principles for authorizing and authenticating individuals, setting access controls, and auditing in an HIE. The principles were proposed to be specific enough to assist organizations in making decisions regarding electronic exchanges, yet flexible enough to adapt to a variety of network architectures for the exchange, evolving and new information technologies, updated national standards, and experiences gained by health care organizations with the implementation of an electronic exchange.

The variation in the level of specificity in the description of the recommendations generally reflects the level of technology adoption and use by the stakeholders within a given state and the level of advancement of HIE initiatives within the state. This makes it even more critical that the state teams continue to work collaboratively and share information. State teams reported that the primary issues include the need for broad agreement on standards for data security, quality and transmission, patient and provider identity management, and defining common data elements that need to be segments in electronic systems. At least seven states indicated that they would pursue proliferation of these standards through a centralized exchange (RHIO-type) model that would be responsible for determining and enforcing standards with the entities involved in the program. A number of states also noted that inclusion of the ability of systems to incorporate interaction with the patient should increasingly become an important consideration when defining the necessary technical elements of a system. The risk that states will develop their own, potentially incompatible standards, absent extensive coordination of these efforts, is real.

5.3.1 Data Security and Transmission

Data security appears at the forefront of almost every discussion about the technical issues concerning electronic health information exchange. Twenty-three state teams addressed issues related to one or more of the following domains: authorization, authentication, audits, and access controls. Some discussions were fairly general regarding the importance of developing or proliferating common security standards for the storage and transmission of health record data, while others outlined very specific solutions, indicating that they were prepared to move forward with some level of implementation.

This report does not support one standard over another; however, only 6 of the state subcontractor reports suggested modeling any of their data standards solutions on the work of such entities as the Health Information Technology Standards Panel (HITSP) or the Certification Commission for Healthcare Information Technology (CCHIT). The following summary captures the basic issues under data standards and solutions that have been proposed by the state teams. The following summary captures the fundamental issues under data standards, and solutions that have proposed under this contract.

Data Security

Authentication. Authentication is defined as the ability to verify that a person or entity seeking access to electronic health information is whom he or she claims to be. At least 19 states discussed authentication issues as an important component of ensuring data security. Maintaining a minimum standard for authentication between entities involved in an exchange was cited as a major factor in building trust between the entities participating in an HIE and to ensuring that records have the appropriate privacy and security safeguards within the receiving organization.

Issue: For organizations to feel comfortable transmitting information electronically to another organization, is important to trust that only appropriately identified users at the receiving location will have access to the private health record data being sent.

Solution: Require agreed-upon minimum requirements for a password system to allow access to health information.

Solution: Actively support initiatives that move the common standard between organizations toward biometric authentication for all network users. Although user ID and passwords are used most frequently to authenticate user access, biometrics provide authentication that is far less subject to misuse.

Solution: Designate an individual within each organization involved in an exchange program to serve as an end user or super user. This individual ensures that the authorization of individuals or entities transmitting or receiving health information electronically falls within the security guidelines agreed upon between entities. The super user is established through an authentication process following a site visit by the central HIE authority (such as a RHIO). Once the super user is established, that entity could authorize system access of others in that organization. The super user must maintain a credible system that prevents inappropriate access and allows local and consistent monitoring.

Solution: Encourage the ability for HIE systems to incorporate the use of telephone technology built into the system that would automatically call a designated representative of the user requesting information to verify the identity. Many users may be more comfortable with this option, as it does not entirely remove the human element from disclosure decisions; however, it does take steps toward automating the current process, and makes it more efficient. Also, the use of integration messaging technologies and fax forwarding services should be considered as components of the HIE telephony technology. The implementation would be similar to a transcription service.

Issue: Although standards for authentication exist, they have not achieved widespread consensus, and individual providers feel uncertain when transferring data from one system to another.

Solution: Undergo an effort to determine standards for authentication that can be shared between organizations seeking to transfer health information electronically. Individual solutions proposed by states include:

Authorization and Access Control. Information authorization and access controls allow access only to people or software programs that have been granted access rights to electronic health information. Consumers and those responsible for maintaining their data are concerned not only that the level of information shared among entities is appropriate, but also that the individuals receiving the information are appropriately authorized to view the data. Authorization solutions were usually included with discussions about role-based access, both of which are included below.

Issue: Many entities reported a sense of unease when sending data to another entity, because they had no way of knowing whether the information would be seen only by an appropriately authorized individual. Most stakeholders agreed that full access to all data contained in an electronic system should be restricted. It is not enough for users to be authenticated into a system; they must be assigned access that allows them to see only the information appropriate to their authorized position. The levels of access must be comparable between entities for a sending organization to feel comfortable that the receiving organization will manage the data in a manner all parties agree upon.

Solution: Require participants in an exchange to institute role-based access for any individual authorized to utilize the system. This requirement would assure other participants involved in the exchange that the data being transferred will be used appropriately.

Issue: A variety of disclosures allowed under the HIPAA Privacy Rule for treatment, payment, and health care operations would require a guest user to have access to a system if the interaction were to be carried out electronically. Therefore, nonaffiliated providers (including payers) might require short-term or limited access to information in a system that they are not typically authorized to access.

Solution: Define parameters for temporary authorization of nonaffiliated providers, health plan representatives (payers), and others who might need access for allowable treatment, payment, and health care operations disclosures. Create a uniform system to allow payer access to minimal and necessary personal health information. Only those with proper and predetermined authorization are permitted to access appropriate portions of the file.

Issue: User roles and the health information authorized for use and exchange vary widely among entities. Entities are often uncomfortable with the idea that information provided only to a physician within their organization may be open for viewing and use by other clinicians or administrative staff in another organization.

Solution: Create a common set of role-based access levels for all users of a system. Common standards established for all entities participating in the exchange would be relevant for a wide range of organizations.

Solution: Create a centralized provider directory within the state. A centralized system or service could ensure all users have been given levels of access appropriate to their use of the system.

Solution: Authenticate and designate a site-specific role manager at each participating location. The role managers would be responsible for verifying the appropriate access level at their location.

Issue: Use of the National Provider Identifier (NPI) can be used as an authentication component, but the National Plan and Provider Enumeration System (NPPES) does not validate licensing or credentials. Although the NPI may identify an individual or organization as a provider, it does not accurately authenticate the entity or help to determine the access rights that entity should be given.

Solution: Local or state efforts must establish criteria for the credentialing and granting of access rights to HIE system users to ensure they have the proper licensing or other credentials for gaining access to the health information within the system.

Issue: Although issues affecting electronic exchange within a state were the primary focus of this project, state teams were also encouraged to think about issues that would prevent interstate exchange. One such issue is that licensure classes across states are widely varied; therefore, it could prove difficult to engage multiple states in an exchange requiring role-based access if standards are based on state-specific licensing criteria.

Solution: A standard coding system across states, such as STEM E1986 Standard Guide for Information Access Privileges to Health Information, would better enable interoperability across state lines.

Audit. Information audits refer to system requirements that record and monitor the activity of health information systems. The ability to create and communicate audit trail events for privacy and security related to the communication of patient health identified information has long been identified as a core building block for HIE systems.15 Stakeholders from the states indicated that it was important to ensure all organizations were monitoring the access of data by users, as a safeguard against improper use or modification of personal health data.

At least 3 states mentioned the support staff needed to maintain, monitor, and analyze the complex and voluminous data captured if stringent audit requirements were imposed. Many smaller providers would require additional funding to secure that staff, which poses a significant barrier. Although minimum audit requirements are essential to ensuring the privacy and security of the data, decisions regarding the functions should be made in light of these practical considerations.

Issue: Many stakeholders related the difficulty of implementing adequate audit systems in their own EHRs and recognized the fact that auditing capabilities varied widely from organization to organization. The fear was that data would not be audited appropriately to ensure proper handling by the entities authorized to use it. To encourage sharing of EHR data, systems should require similar audit functions to ensure appropriate monitoring of access to data.

Solution: Establish auditing standards to ensure appropriate monitoring of access to data is comparable between entities involved in the same HIE system. Individual solutions include:

Issue: Many current EHR systems only keep audit information of the most recent access to the record and may not have the technical requirements or personnel necessary to support vigorous audit requirements.

Solution: Create cost-effective, efficient, automated proactive mechanisms for audit.

Transmission

Issues surrounding the standardization of transmission requirements crossed into the realm of legal and policy solutions. Ultimately, the technology exists to ensure private and secure transmission, but too often there is little or no communication among organizations to allow for electronic transmission. Therefore, 7 state teams offered specific technical suggestions to encourage electronic health information exchange.

Issue: A minimum set of rules and guidelines are necessary for secure transmission between two or more entities. Currently, these guidelines are individualized and highly variable because of the widespread ambiguity regarding standards stringent enough for secure transfer of patient health information. Also, many stakeholders related a feeling that the complexities involved in outlining such guidelines are prohibitive and discourage entities from pursing electronic exchange agreements.

Solution: Begin developing standard policies for encryption and transmission of electronic data that can be utilized as a common ground or starting point for entities to begin exchanging health information. Individual solutions include:

Solution: Clarify rules governing the use of electronic signature.

Solution: Evaluate the policies concerning e-mail use between organizations.

Solution: Use PKI to access health data between entities.

Solution: Develop a secure web portal for health data exchange that can be utilized by any entity within the state interested in adopting the shared guidelines and security measures.

Issue: One option for exchanging information among physicians while the patient's record is active would be to provide messaging functionality within the facilities participating. This would include the technology necessary to transfer information from one system to another. This practice would allow physicians to request a consult and provide the consulting physician access to the patient's medical information. Currently, however, definitions for secure electronic messaging solutions to support provider-to-provider communication do not exist.

Solution: Create a consensus framework for a shared secured messaging platform, including technical and functional requirements.

Issue: Without the development of a standard data set, entities will be responsible for determining which data elements should be included in every transfer, decreasing the efficiency an electronic transfer could provide over a paper-based transfer.

Solution: Develop a standard set of data elements for use for exchanges of information that take place when the patient is receiving services from a consulting physician.

5.3.2 Patient Identity Management

The ability to accurately identify patients across systems is a major issue. Sixteen state teams discussed technical solutions, although, as with previous technical solutions provided in this report, the issue of patient identity management crosses over heavily into policy and legal discussions. For the most part, these state teams agreed that some system of identifying patients between entities must exist for true interoperability to occur, and that these systems must include stringent criteria for matching patients so that the confidentiality of patient records could be assured.

Solutions ranged from the use of a unique patient identifier to the establishment of a centralized patient identity management service. The solutions offered by many states called for a mix using more than one of these individual propositions.

Issue: When exchanging personal health data between entities, an HIE system must ensure that the appropriate records are matched to the appropriate individual.

Solution: Create standards for matching patients, using minimum and optional data elements. Individual solutions include:

Solution: Pursue the use of a unique identifier for patient identification, either on the state or national level. Although this solution is currently prohibited by federal law, at least 2 states expressed the viewpoint that matching patients to their records could not happen with the level of accuracy needed (presumably 0% likelihood of either a false positive or false negative match) without a national patient identifier.

Solution: Still other states believed that patient identification could be managed but recommended establishing a centralized patient identity management service.

5.3.3 Segmenting Data

The management of health information deemed specially protected is another area with a complex set of drivers. Because these sets of specially protected information are often determined by state or federal law to require additional consent or other considerations when transmitting between entities, many providers prefer not to exchange them at all. In fact, while 17 states included a discussion on specially protected health information in their solutions reports, only 6 discussed technical solutions for integrating this data into HIE systems. For these states, the answer was usually to segment the data in the systems. However, this solution requires extensive planning, programming and could potentially increase the workflow burden on the provider. While segmenting specially protected information in an electronic system is likely the only way to enable transmission in many situations from one entity to another, the complexity it adds to these systems can be prohibitive.

Many states in the later stages of planning, implementing, or expanding local or regional data exchange programs have considered the need to include technical specifications ensuring that all specially protected information is collected, stored, and exchanged in accordance with state and federal law. They must also consider policies that participating organizations are comfortable with when they enter into an exchange with other entities.

Issue: To ensure it is not included in standard data transfer, specially protected information requires additional technical considerations in HIE systems, such as the ability to "mark" a piece of data as protected, and the ability to specify the conditions under which the data can be transferred. This capability currently does not exist.

Solution: Because of the increased consent requirements in many states, specially protected information would require additional and sometimes item specific opt-in/opt-out procedures for patients and methods for capturing and transmitting that information within and between systems.

Solution: Specially protected information requires some additional technical considerations for increased control of access to data. Individual solutions include:

Solution: Create functional requirements for suppressing specially protected information concurrently with creation of consensus policies.

Solution: For the very few states that do not have stringent legal requirements on the transfer of specially protected information, establish parameters to ensure that all health information is treated with the same privacy and security standards, including regular and specially protected health information.

5.3.4 Standards That Affect Technology

HIE Agreements

Seven states noted that the standardization of HIE agreements, such as business associate agreements (BAAs) and other data use agreements that enable the sharing of data between entities, would be extremely beneficial.16 While the construction of model or standardized agreements is largely an issue of creating consensus around policies, these polices must include specific indications of technological minimum requirements. BAAs define standards for data confidentiality and integrity during end-to-end electronic exchanges and also outline parameters for the interoperable mechanisms used to uniquely identify patients and health care providers between systems.

Consent

While the majority of states discussed consent as a policy issue, 6 state teams also examined the technological implications of consent. Typically consent is paper based, but as electronic health information exchange becomes more widespread, consent will likely need to be noted within the electronic record, especially in cases of specially protected information (as discussed earlier in this section). Consent is also closely tied to other issues discussed at the beginning of this section, namely authorization and access control. If appropriate disclosure within an electronic system is driven by a user's authority and level of access within that system (especially if the access is role based), issues of consent become more important. The ability to capture consent uniformly within an electronic system also enables the transmission of that information between entities.

At least 6 states noted the importance of establishing uniform consent policies across a RHIO for those exchanges to be successful. None of the states involved in this project reported having a functional system with for the technical capacity to capture, share, and implement patient consent. At least one state mentioned that this was due almost entirely to current technical restrictions. However, eventually, electronic systems will not only need to capture patient consent, but also to record and implement changes in consent over time and with changes in the patient's medical and clinical conditions.

Patient-Centered Health Information Exchange

Many states noted the importance of involving the individual patient in more profound ways. In recent years, considerations of the value of a health data exchange that puts the consumer/patient at the center of the exchange process have emerged as private and public activities. Therefore, at least 3 states are considering systems that would allow the patient to direct where and how much of their heath record data is sent. In one proposed model, when a request for data occurs, the provider of the data would send it to a person-controlled software agent. The agent, as configured by the person who is the subject of the data, permits and completes appropriate exchanges and rejects others. This approach draws the patient into the health care process, eases the creation of personal health records and their associated applications, permits individual flexibility related to privacy, and returns the issue of who is included in the information flow related to a patient's care back to a dialogue between the patient and his or her health care provider(s).

This particular model would address many of the current concerns regarding electronic health information exchange, although for many groups, it raises other issues that are just as complex. Individual consumer involvement at the center of the health care information exchange may result in an enhanced awareness of privacy and security issues across the general population. However, what happens if a patient blocks access to data that could potentially save his or her life? What is the best way to reach patients who do not have access to computers or do not understand the complex issues involved in making these decisions?

Although these questions should remain important counterpoints for consideration, models exist for creating such consumer-oriented programs, such as the guidelines for personal health records described by the Markle Foundation's Connecting for Health report, and person-centered RHIOs such as the Louisville Health Information Exchange (LOUHIE). Regardless of consumers' level of control of the exchange of their health record data, their needs must be seriously considered when determining the technical requirements of HIE systems.

5.4 Education

Twenty-nine state teams recommended some form of education program(s) to increase the knowledge within stakeholder groups ranging from providers to the general public. The majority of these education-based solutions are proposed to reduce variation in how policies are put into practice or to increase general awareness of various stakeholder groups regarding the advances and trends in electronic HIE. These discussions of education-based solutions were commonly directed at consumers and providers, although the formula for achieving this outreach tended to vary widely. Some state teams proposed creating educational materials to be used by both groups, although most state teams proposed separate programs tailored to each group. Also, a significant number of states included educational programs as fundamental components of an HIE regulatory body, whether that body currently exists, or is in the planning stages.

The majority of the state teams recommended informational campaigns as a method to educate consumers. The plans for developing education for individual providers and organizations typically followed a more institutionalized method, such as training requirements for users of HIE systems. While specific solutions contain some variation depending on the state's unique context and environment, the underlying assumption was almost always the same: if the solutions proposed in these reports are to be successfully implemented, consumers, providers, and organizations need to be educated on the advantages of electronic HIE and fully aware of the privacy and security safeguards that are being established to protect health information.

5.4.1 Consumer Education

As mentioned above, a majority of states highlighted the need for consumers to be educated about their rights as well as how to work with providers to understand who can access their information and how it can be done.

The consumer-focused solutions discussed in detail below can be summarized in the following major groups:

A major issue that these solutions confront is the wide variation in knowledge of privacy and security issues among consumers, not only underlying the electronic exchange of their personal health information, but also a fundamental lack of understanding about their health information rights and responsibilities. In such an environment, it is difficult to begin a discussion about the benefits of electronic health information exchange. Misunderstandings and mistrust about the current paper-based privacy and security protocols for storage and exchange of health information creates a general hesitancy toward authorizing such exchanges. In a wider, patient-centric lens, this also profoundly limits patients' ability to maintain and monitor their health information. Patients' ability to review their own health records would often be the first line against privacy and security breaches. Individual solutions provided below address the issue of general public misunderstanding.

Issue: Patients lack knowledge about their rights, which leads to trust issues, although patient trust will be critical to the success of electronic health information exchange.

Solution: Implement a campaign to educate the public about privacy and security issues and electronic health information exchange. Individual solutions include:

Solution: Establish a centralized method to develop and distribute educational materials concerning patient rights and responsibilities and enable them to protect and monitor their health care information.

Issue: Patients may be unaware of the privacy and security safeguards available in an HIE system or may not have the technical knowledge to adequately monitor their data or make informed decisions leading to frustration and confusion.

Solution: Create standardized educational materials for patients to ensure they understand the technology as well as their ability to interact with it.

Issue: Consensus among stakeholders can be difficult to find, and the attitude of the general public is likely to change and shift during this transition period.

Solution: Implement a process for collecting information from consumers to monitor progress and ensure satisfaction with electronic health information exchange decisions.

5.4.2 Provider Education

While consumer education is a major concern, many states reported misunderstanding of the capabilities and benefits of electronic health information exchange, as well as fears regarding data security within the provider community. Solutions requiring provider education included:

These solutions highlight a few key issues. For instance, adoption rates for HIE systems continue to be quite low in most areas of the country, making it difficult in some very low adoption areas to encourage robust discussions on interoperability. Startup costs could be part of the problem, but as a number of states pointed out, a significant barrier to adoption is lack of provider trust and education about the systems themselves. Increasing awareness about certification, standards, and the advancements in capabilities of systems to increase private and secure transmission of data could lead to higher adoption of EHRs and, therefore, increased discussions about interoperability.

Issue: Many health care professionals do not accurately or completely understand the HIPAA Rules or relevant state privacy laws.

Solution: Provide education for health care providers about state and federal privacy and security laws and regulations, specifically in reference to electronic health information exchange.

Issue: Within the health care provider community, states found a lack of knowledge about the capabilities of HIE programs. Many did not believe that the expense was worth the risk of buying a system that might significantly hinder their workflow or require complete retraining of the staff to use the system.

Solution: Implement a campaign to educate providers about HIE opportunities available to them.

Issue: State teams uncovered a significant lack of knowledge within the health care provider community on how to adequately ensure protection of privacy and security when implementing electronic health information exchange. Many providers believe electronic transfer of records is too risky, either because they are unaware of how the HIPAA Privacy and Security Rules apply to electronic transfer, or because they are afraid a security breach will create negative publicity that will affect the trust of their patients.

Solution: Provide education and training for providers regarding proper procedures, the need for standardization, and benefits of HIE.

5.4.3 Integrated Education

Many states discussed education as a fundamental and ongoing issue that required consistent structure and funding. At least 18 states proposed harnessing either proposed or existing entities to provide or oversee some aspect of the required educational activities within the state as part of their mandate.

Issue: The need for education to all stakeholders will be ongoing, although funding sources and consistency of these efforts is often lacking.

Solution: Integrate education efforts as part of existing efforts, such as:

5.4.4 Education Targeted to Specific Groups

Although education of health care providers and the general public dominated the educational solutions, some important education-based solutions were proposed for special groups of stakeholders. Special considerations needed for these groups were often uncovered in the assessment of variations process when it became apparent that a general disconnect existed between certain stakeholder groups that are either often forgotten in discussions involving electronic health information exchange, or groups that have particular interest in an aspect of electronic health information exchange that may be more controversial. Targeting these groups focuses on solutions that will help decrease variation in business practices across all involved entities affected by electronic health information exchange.

Issue: Certain stakeholder groups might require focused attention to ensure that their unique perspective is reflected in electronic health information exchange decisions.

Solution: Create targeted education and outreach materials to these groups.

5.5 Implementation and Governance of Privacy and Security Solutions

5.5.1 General Implementation and Governance Issues

Twenty-two states identified solutions that involved implementation and governance issues. Implementation and governance policies usually varied according to the degree of electronic health information exchange within the state. States with limited electronic health information exchange penetration were more likely to propose governance structures that would consider basic technical issues, such as those discussed in Section 4.3. In states that were more advanced, proposed governance structures were predicated on the assumption that the technical considerations were already addressed. Eight states proposed forming a committee or some other centralized authority to address implementation and governance.

Issue: Both advanced and early-stage states indicated a lack of coordination within the state on issues of ensuring privacy and security that would encourage interoperability within the provider community.

Solution: Institute a centralized authority to coordinate these efforts along with any other HIT efforts in the state. This would provide a means to ensure consistent, long-term input as the transition between a paper-based and electronic health care system continues to take place. Some examples of authority/committee duties include:

Solution: For states that have more complex legal issues, require any proposed authority/committee to interact with the state legislature.

Solution: 10 states identified multiple ways in which increased coordination among those involved with electronic health information exchange (providers, payers, technology providers, clinicians, etc.) could enhance the adoption of electronic health information exchange and provide increased privacy and security safeguards. Examples of proposed coordination tasks/solutions are:

Solution: 4 states suggested the use of contractual agreements (exclusive of BAAs) as another solution to governance issues. (BAAs were mentioned by 11 states, although not generally in the context of improving governance or implementation.)

In addition, many states discussed factors that would be included when and if they moved toward implementing solutions. Although some might be obvious goals of a governance body, they begin to inform a framework, built on some of the lessons learned during the project, around which the direction of these bodies could be built. Factors to consider when implementing a governance body include:

5.5.2 Governance and Implementation of HIEs

Although a number of states have some form of HIE projects in place, the legal status under the HIPAA Rules and state law of certain entities that participate in HIEs is often unclear. Several states reported that they were working to form an HIE, while others were reluctant to do so absent clarification on this issue. Despite this uncertainty, many states have functioning exchanges and have developed a variety of solutions for the governance of existing exchanges including:

States that were interested in forming an HIE, but had not yet done so, offered the following solutions:

5.6 Ancillary Issues and Solutions

5.6.1 Funding

Solutions related to funding fall into two broad areas: sources of support and methods for demonstrating the need or merit for funding. States generally suggested a combination of funding sources including government appropriations, grants, and user fees. Alternatively, 4 states indicated that they would attempt fundraising efforts, and 3 other states planned to seek discounts or donations from technology vendors. To demonstrate the merit of funding HIT initiatives, 4 states have planned a cost-justification or cost-benefit analysis. Finally, one state is planning a statewide collaborative effort to reduce the overhead costs of installing components of HIT infrastructure.

Although some states identified strategies for financing HIT initiatives, they did not usually match with the states proposing new legislation and regulations. Only one state noted the need to include funding provisions in order to avoid unfunded mandates.

5.6.2 Incentives/EHR Adoption Issues

Financial incentives are an obvious solution to EHR adoption issues. Small providers, those located in rural or low-income areas, or providers with a large percentage of underinsured or uninsured patients may have financial difficulty in purchasing and implementing EHR. The states proposed of the following incentives designed to facilitate EHR and HIT more generally:

States also suggested nonfinancial methods for encouraging EHR adoption. Seven states proposed general advocacy of EHR, including education (see Section 4.4 for additional information on educational programs). Finally, one state planned a mentoring program for providers who were implementing EHR.

5.6.3 Stakeholder Engagement

Several states noted that stakeholder engagement was crucial to the success of the proposed solutions. Stakeholder engagement was cast as a method to understand consumer and provider wants and needs, and also as a method to educate stakeholders about existing efforts and their potential participation in those efforts. Stakeholder engagement solutions were aimed at consumers, providers, payers, or some combination. Six states planned consumer-specific engagement programs. These included:

Four states described a more comprehensive approach that would target consumers, providers, and payers in the same initiative. In the majority of cases, stakeholder engagement included educational programs. One state noted the need for outreach to consumers who do not have access to a computer or who otherwise may not have a voice in the stakeholder process, such as individuals who do not speak English as their first language.


6. NATIONAL-LEVEL RECOMMENDATIONS

Throughout this project, the state project teams focused primarily on generating potential solutions that could be implemented at the local or state level to develop privacy policy and security standards that enable electronic health information exchange nationwide. However, state teams also recommended solutions at the federal level that would be highly valuable to states as they develop their privacy policy and security standards.

Many of the ideas summarized in this section were also raised by state teams as potential solutions to be implemented at the state level. The state teams that chose to offer national-level recommendations generally indicated that privacy policy and security standards for electronic health information exchange could achieve faster uptake if adopted at the national level rather than trying to come to agreement nationwide at the state level. The following recommendations represent the contributions of all 34 state project teams.

6.1 National Standards

6.1.1 National Standards for Transferring Health Information Among States

State teams most frequently called for national standards that would collectively guide the transfer of patient health information between states. Although most of the states have made significant strides under this project in moving toward data standards that work for the context of their state, they were concerned that, without a centralized effort, states might go in disparate directions or that the effort would take far longer to coordinate. Nineteen states included some discussion about national-level standards that would ensure transfer could be attained from state to state. These states were interested in standardizing both a basic set of data elements to be included and accompanying data standards for the interstate transfer of personal health information. Both major areas are broken out below, providing some of the specific state recommendations.

Standard Set of Data Elements

States could begin developing initial exchange programs if they were provided a basic list of health information to be included in a patient health summary or standardized medical record (excluding specially protected health information), such as normalized clinical patient demographics, eligibility data, allergy list, prescription list, laboratory and radiology (text and image) results, and potential immunization records. One state team suggested the use of the continuity of care record standard as the first adoption target. Another state team suggested the use of standard reports, such as the Reports of Verified Cases of Tuberculosis, as model standards.

Technical Security Standards

A frequent suggestion included establishing national guidelines and adopting standards for the implementation of authentication, authorization, access controls, and auditing for adoption by state and regional health information exchanges (HIEs). The significant variability and lack of standard methods, practices, and policies (sometime even within an organization) on each of these 4 security domains were cited in all states as major barriers to HIE. Some specific national-level recommendations included:

All states expressed an interest in sharing data across state lines; however, many were concerned that expecting each state to broker the set of health information to be shared and establishing the methods by which this would happen would lead to a fragmented and disjointed system. States also noted that while technical solutions can be designed and implemented at local and regional levels, the choices made for each of these systems might be so different that they would be unable to find ways to interoperate. Use of different data elements to accurately locate a patient or to segment specially protected information could cause costly and time-consuming interoperability issues. National standards and guidelines would provide states with a platform to begin exchange discussions, which they could alter if necessary, but maintain a similar core of information from state to state.

6.1.2 National Standard for Health Information Exchange-Related Business Associate Agreements17

Similar arguments were proposed for the development and publication of a national standard for data sharing agreements, such as a business associate agreement (BAA).18 Eight state teams proposed that a standard BAA be established at the national level, even though a national standard for BAAs and data use agreements is included in the HIPAA Privacy Rule. These state teams pointed to BAAs as potential catalysts for encouraging electronic health information exchange. The state teams also emphasized the increased burden that would come from creating a BAA from scratch for every type of exchange. Therefore, they called for a national standard or template to encourage the discussion of data sharing among entities. None of the states mentioned using national standard templates such as those that have been developed by American Medical Association, the American Hospital Association, or the Blue Cross Blue Shield Association.

6.1.3 Standardized Model National Consent Form

Five state teams called for a standardized model national consent form or template that would guide the large number of providers who reported confusion about consent requirements, or continued to worry about liability concerns with transferring information without proper consent. The state teams making this recommendation indicated that a uniform or model consent form is an essential component to encourage data sharing among organizations and across states. Many state teams have proposed solutions to develop statewide uniform consent models. State teams recommending a model national consent form recognize that each state must be concerned with the unique laws that might affect their consent process, but also that using a common template decreased the likelihood that the consent process in one state is fundamentally incompatible with the consent process in another state.

One suggestion concerning the items that should be considered for such a form included: general consent requirements; consent principles relative to condition-specific consent requirements; interstate information exchange; information exchange with payers and employers; use of information for marketing; compliance with the HIPAA Rules, 42 C.F.R. pt. 2, and other statutes that are relatively common across states (eg, those that protect mental health, HIV/AIDS, minors, genetics data); and waivers of consent when the patient's life is at risk and in public health emergencies.

6.1.4 Centralized Model Regulation Process

To develop a centralized model regulation development process, 4 state teams suggested a range of options: a national effort to provide structured guidance to the current national standard setting bodies, a centralized national process to examine the role of emerging standard setting organizations, and working with the National Conference of Commissioners on Uniform State Laws (NCCUSL) to broker a set of model legislation. Although many of these solutions would require significant input from the states, all states proposing this recommendation felt that some federal oversight was needed to ensure that resources were provided to pursue the production of model standards or model legislation.

6.1.5 National Oversight Body

Three state teams proposed that an organized authority or oversight body guide the standardization of privacy and security implementations among states. Although all 3 states provided different alternatives, the overwhelming sentiment was that such efforts could accelerate the adoption of recognized model laws, contracts, policies, and procedures among HIE entities. One state team also recommended that the national oversight body oversee a consistent national educational campaign to consumers that will lead to greater public understanding and HIE participation.

At least 6 other states indicated that the state governing bodies that oversee privacy and security operations for HIE should try to follow or adopt any federal standards or guidance. Other states pointed to existing bodies as possible entities for oversight and guidance.

6.2 Clarifications/Revisions to Federal Regulations

The second most frequent set of issues raised by the state teams that offered national-level recommendations included recommended revisions and clarifications to federal regulations, including the HIPAA Rules, 42 C.F.R. pt. 2, Clinical Laboratory Improvement Amendments (CLIA), and Medicaid data disclosure regulations.

6.2.1 HIPAA Privacy Rule Revisions/Clarifications

Six state teams commented about clarifications or revisions to the HIPAA Privacy Rule. One state team stated that clarification and perhaps revision of the Privacy Rule is necessary to reduce the variation in understanding and application of Privacy Rule provisions across organizations and states. Three states commented that many of their state-level solutions could readily be shared with other states and, therefore, are relevant at a national level.

One state team proposed that the federal government amend or update the HIPAA Privacy Rule to address whether patients need to provide separate consent or authorization to allow their protected health information (PHI) to be accessible through the HIE network. In addition, the state team proposed that the amendment address whether a patient must take affirmative action to opt in to the network or will be allowed to opt out of the network. A second state recommended a change to the Privacy Rule that would require the provider to obtain authorization for downstream disclosures at the point of service to facilitate future requests for disclosure of health information held by that provider.

One state team provided recommendations along with a detailed rationale, which is presented below. The state team noted that, although the HIPAA Privacy Rule introduced requirements intended to protect patient privacy, the analysis of business practices revealed that, in some cases, the requirements increased administrative burdens that may impede electronic health information exchange without commensurate improvements in patient privacy protections. The state team further explained that in other cases, the HIPAA Privacy Rule requirements provide important protections to patient privacy but are broadly interpreted and implemented with wide variation. The state team recommended 3 changes to the Privacy Rule:

  1. BAAs: Remove the requirement to have a BAA, but hold business associates directly accountable and liable for adhering to the HIPAA Rules.
The rationale is that determining the requirement for a BAA is administratively burdensome. Drafting BAAs is similarly time- and resource-intensive because separate, unique BAAs are required for almost every business associate. Although a national standard for BAA language exists, it is not uniformly applied. BAAs can also be confused with trading partner agreements. On balance, work group members consider BAAs to be burdensome and costly undertakings with little gain to operational efficiency or patient privacy.

  1. Minimum necessary: Develop model policies and procedures to clarify and promote consistent application of the minimum necessary standard.

The minimum necessary standard, a specific protection of the Privacy Rule, is derived from confidentiality codes and practices commonly used today.19 It is based on sound current practice that the use and disclosure of PHI should be limited to what is necessary to satisfy a particular purpose or carry out a function. The minimum necessary standard requires covered entities to evaluate their practices and enhance safeguards as needed to limit unnecessary or inappropriate access to and disclosure of PHI. The Privacy Rule's requirements for the minimum necessary standard are designed to be sufficiently flexible to accommodate the various circumstances of any covered entity.20

The Privacy Rule requires that the minimum necessary standard be applied unless the regulations specifically states otherwise. The application of the standard is distinctly different for uses other than disclosures and is applied differently for routine and nonroutine disclosures. The Privacy Rule generally refers to uses as internal sharing of information and disclosures as a release of information made outside the covered entity. The Privacy Rule is written so that each covered entity interprets the minimum necessary standard in its own policies and procedures.

The state reports that application of the minimum necessary standard creates a significant barrier to electronic health information exchange. The standard makes it difficult to determine what is to be disclosed and allows for subjective decision-making on the amount of information that is disclosed. Moreover, it is difficult to know what information will be received.

The state team noted that it may not be feasible to adhere to the minimum necessary standard in many HIE systems. In an electronic exchange, minimum necessary may require limitation of access or other technology that allows for layered access. In organizations with paper records, for exchanges subject to the minimum necessary standard, an individual must sort through the chart and copy only the relevant pieces of information before releasing the information. The standard, therefore, may require specific technology requirements, specially trained staff to evaluate records, or both, which may increase costs and administration of the disclosure process.

In addition to the requirements of the law, variations in business practice as a result of varying applications of the standard of the loosely defined law create further barriers to information exchange. For example, if one organization limits information in one way while the organization it is exchanging with limits it another way, it is difficult to obtain the information required for the intended purpose. The inconsistency in application may also result in insufficient information being provided when necessary for patient health care processes. Thus, the state project team recommended both rewriting a section of state code, so that it mirrors the Privacy Rule and developing state and national model policies and procedures for defining and applying the minimum necessary standard.

Almost all of the states recognized the need for each state to clarify and standardize the minimum necessary requirements to reduce the variation in business practice and policy that will impede electronic health information exchange, and the majority felt that a national standard or uniform agreement for defining and applying the minimum necessary standard was necessary. One state proposed a change to the HIPAA Privacy Rule to allow full sharing of patient information for treatment, payment and health care operations, minus the minimum necessary requirement.

6.2.2 Clarify Legal Status Under HIPAA of Entities Participating in a Health Information Exchange

Two states noted the need to clarify the legal status of certain entities participating in centralized, state-level HIEs, including regional health information organizations (RHIOs), under the terms of the HIPAA Rules and to clarify whether these entities should be considered covered entities, business associates, or another as yet undefined category. The state teams also agree that a framework needs to be developed at a national level for liability that addresses the role of the state-level HIE organizations (such as a RHIO) and the interaction of federal and state regulatory frameworks. The state teams noted a need to adopt a nationally accepted common definition of terms when referring to these organizations, their organizational and structural models and core components, their operational frameworks, and their legal standing in terms of liability.

6.2.3 Confidentiality of Alcohol and Drug Abuse Patient Records (42 C.F.R. pt. 2)

Seven states expressed concerns about the current constraints to exchanging alcohol and drug abuse patient record information under 42 C.F.R. pt. 2.21 This regulation generally requires information from an alcohol or substance abuse treatment program to be treated confidentially. The rule generally requires the patient's consent for disclosure of information, including for treatment (except in emergency circumstances) and prohibits a health care provider or plan that receives such information from redisclosing that information without patient consent.22 In contrast, the HIPAA Privacy Rule does not require consent or authorization to disclose or redisclose health information for treatment. Because 42 C.F.R. pt. 2 is more protective of patient privacy in this circumstance than the Privacy Rule, a number of states believe this creates a barrier to electronic health information exchange and may interfere with the quality of care.

Three states proposed legislative or regulatory solutions including:

6.2.4 Revision or Amendment to CLIA Regulations

One state suggested a revision to the federal CLIA regulations. The federal CLIA regulations, 42 C.F.R. § 1291(f), currently provide that "Test results must be released only to authorized persons and, if applicable, the individual responsible for using the test results and the laboratory that initially requested the test." The term authorized person is defined in 42 C.F.R. § 493.2 as "an individual authorized under State law to order tests or receive test results, or both." The term individual responsible for using the test results is not defined in the CLIA regulations, and the team found considerable uncertainty about its meaning. The state team proposed that the federal CLIA provisions may pose a barrier to laboratories' exchanging test results directly with the non-ordering providers to whom patients are referred, RHIOs, and other stakeholders who may participate in electronic health information exchange for legitimate purposes otherwise permitted by the HIPAA Privacy Rule but are not identified as authorized persons for receipt of test results under state law. The state team's proposals include changes to both state and federal statutes to clarify the terms believed to be causing the confusion. Such changes may not be feasible at the federal level, and any effort to make these changes to state law should be thoroughly researched to ensure consistency with the purposes of the intended privacy permissions under CLIA.

6.2.5 Clarification of Medicaid Data Disclosure

Many states noted that federal guidelines related to Medicaid data release were a barrier to electronic health information exchange. To facilitate this exchange, 2 states felt that the Medicaid guidelines needed to be reviewed at a federal level and that guidelines/rules should be established to facilitate the flow of health information between Medicaid programs and non-Medicaid providers. Federal statute and regulations require that disclosure or use of Medicaid data concerning applicants or recipients must be limited to "purposes directly concerned with administration of the plan."23 Medicaid plan administration is narrowly defined and only includes determining eligibility and amount of assistance, providing services to recipients, and conducting or assisting with investigations, prosecutions, and civil and criminal proceedings related to administration.24 In addition, information concerning Medicaid applicants or recipients may be shared only with persons who are subject to standards of confidentiality that are comparable to the Medicaid confidentiality standards. These restrictions apply to all requests for information from outside sources, including other governmental bodies. These restrictions make it difficult for Medicaid and non-Medicaid providers to share information, and also inhibit the sharing of information between states' Medicaid agencies and other state agencies.

State teams have proposed a number of approaches to this issue. One state team has proposed establishing guidelines/rules that will facilitate the flow of health information between the state Medicaid program and non-Medicaid providers. In general, the state's Medicaid program does not share patient-level data with non-Medicaid providers. For Medicaid to serve as a participant in a RHIO, new rules and guidelines must be established authorizing the sharing of health information between Medicaid and non-Medicaid providers. Federal regulations may limit what can be accomplished through the establishment of state guidelines. Guidelines from Centers for Medicare and Medicaid Services may be more effective. The same state team proposed the establishment of a task force to research opportunities to make electronic health information exchange reimbursable by Medicaid and under the state employee group health plan. Two additional states called for federal clarification of the laws governing access to Medicaid data.

6.3 Funding

6.3.1 Funding for More Widespread Adoption of Technology

Although this project focuses on issues related to private and secure electronic health information exchange, nearly all states raised the issue of low levels of technology adoption and the absence of a technical infrastructure as key barriers to their progress with the privacy and security work. Many state teams that represent stakeholders with low EHR use and no electronic health information exchange among organizations have difficulty gathering support for privacy and security discussions. Two state teams reported that until incentives for adopting EHR systems and HIE become organized and systematic, preferably at the national level, the discussions that have begun may stagnate.

6.3.2 Funding for Educating Patients and Consumers

Although most states noted that various education campaigns were a fundamental way to reduce variation in practice, 2 states reported that this process would best be undertaken at the national level. One state called for a national HHS public relations effort to provide a consistent, centralized, and visible source of education to the public. The focus of the campaign would be to allay the general public's fears about data security, and reveal the many positive outcomes from a secure interoperable electronic network that assures the greatest level of privacy possible.


7. MOVING STATES FORWARD COLLECTIVELY

The primary goal of each state team was to work toward solutions that would enable secure and private transfer of electronic health information between entities. However, the importance of collaboration in this project should not be ignored. Perhaps the greatest long-term effect of these activities will be the concurrent momentum built within each of the subcontracting states, the enthusiasm of which was not confined to state lines. Although the timeframe required under the original project made it difficult for states to construct agreed-upon solutions for transmittal of data across state lines, a number of possibilities were proposed for the future.

7.1 Coordinating Standards and Policy

One state, although focusing on developing successful implementation of their state-level plans prior to widening their focus to cross-state exchange, proposed a strategy to engage in more substantive discussions with other states about planning and implementation. Preliminary discussions have been held with a neighboring state, and the states have agreed to focus on

One state proposing to produce a privacy and security core solutions set mentioned that research and input from multistate stakeholders would help ensure that the final solutions are appropriate for regional and national use.

Policy mapping and exchange agreements among Health Information Security and Privacy Collaboration (HISPC) states were noted as important to achieving the interoperable solutions. Specific exchange analysis and agreements will be needed, along with identification of specific consent/authorizations and standards for exchange. Specifically, the intent is to use the IHE Cross-Community Information Exchange (XCS) profile development, currently underway and under consideration by the Health Information Technology and Standards Panel, to establish a standards-based interstate exchange among states.

The same state urged a process to share and discuss cross-state solutions through an entity, preferably one supported by Office of the National Coordinator for Health Information Technology, such as the State Alliance for e-Health, that can identify solutions affecting interstate HIE. Suggestions for focus areas included patient identification, authorizations for release, and standards. Patient and provider identification were noted as the most fundamental issues, with a secondary focus on information and interface standards.

7.2 Coordinating HIEs Between States

Several states identified opportunities to work with bordering states to coordinate interstate HIEs, particularly those involving emergency situations, public health conditions, or special population groups, such as Medicaid.

7.3 Coordinating Legislation

At least 6 states identified model state law as a pursuit that would save time for each state. The National Conference of Commissioners on Uniform State Laws (NCCUSL) is the logical vehicle to develop common privacy and security solutions across states. NCCUSL will need input both from the HISPC projects and the State Alliance for e-Health to accomplish this goal.

Another recommendation is to establish an interstate task force to collectively develop electronic health information exchange procedures and review laws for HIE among states. An evaluation should be done to determine what laws, if any, should be harmonized at the national level and what laws should stay in place to reflect the values of local communities across the country.


8. CONCLUSIONS AND NEXT STEPS

While the national-level recommendations summarized in Section 7 are an important outcome of the project, the final effort will focus on developing implementation plans for the state/territory level solutions summarized in Section 6. These have been classified into 6 types of solutions—business policy, legal/regulatory, technology/data standards, education, governance, and collateral issues (related to funding, encouraging electronic health record adoption, and stakeholder engagement).

The implementation plans for each member of the Health Information Security and Privacy Collaboration (HISPC) have been emphasized since the project's initiation. Project teams in each state and territory have been reminded that the government's purpose in funding this project has been not only to identify the variation in business practices, policies, and laws that present challenges to electronic health information exchange, but also to develop solutions that protect the privacy and security of health information. The project has generated a great deal of discussion among stakeholders in steering committees, work group sessions, and stakeholder meetings, as well as at the regional and national meetings. These discussions have, in turn, resulted in stakeholders' commitments to fulfill the promises of improved health information exchange. In addition to a better understanding of challenges and solutions, the perpetuation of this commitment is a major goal of the collaboration.

In developing their implementation plans, the state teams have been encouraged to focus on the practical and efficacious. As noted previously, conditions relevant to health information exchange vary on a number of dimensions both within and between states. What works in one state may not in another. The project teams have been encouraged to vet implementation plans with stakeholder groups in the same iterative process used in identifying variations in business practices and barriers and developing solutions.

Draft implementation plans provided by the teams in each state/territory have included specific objectives in

In addition to these concrete objectives, the project teams in each state/territory have provided practical considerations related to accountability, funding, and scheduling.


APPENDIX A
STATE SUMMARIES

Alaska—Summary

Arizona—Summary

Arkansas—Summary

California—Summary

Colorado—Summary

Connecticut—Summary

Florida—Summary

Illinois—Summary

Indiana—Summary

Iowa—Summary

Kansas—Summary

Kentucky—Summary

Louisiana—Summary

Maine—Summary

Massachusetts—Summary

Michigan—Summary

Minnesota—Summary

Mississippi—Summary

New Hampshire—Summary

New Jersey—Summary

New Mexico—Summary

New York—Summary

North Carolina—Summary

Ohio—Summary

Oklahoma—Summary

Oregon—Summary

Puerto Rico—Summary

Rhode Island—Summary

Utah—Summary

Vermont—Summary

Washington—Summary

West Virginia—Summary

Wisconsin—Summary

Wyoming—Summary


ALASKA—SUMMARY

Alaska health care leaders and members of the Alaska Telehealth Advisory Council formed the Alaska Regional Health Information Organization (RHIO) in December 2005 to improve health record exchanges, lower costs, and prevent medical mistakes. The Alaska RHIO began formulating "next steps" in the health information exchange (HIE) process for Alaska. A large gap quickly became apparent between the perceptions of security and privacy and the practices related to security and privacy.

The Alaska RHIO, with the support of the Alaska Governor's Office, successfully competed for a national contract to perform an assessment of security and privacy issues. The Health Information Security and Privacy Collaboration is part of a national effort to share patient health information among health care providers, insurers, and health care agencies. Participation in the national initiative gives a voice to Alaska-specific issues, needs, and recommendations in the development of national policies related to security, privacy, and best business practices surrounding interoperability of HIE.

The HISPC project coordinator organized a core state project team that included members from the State of Alaska, the Alaska Electronic Health Record Alliance, Alaska Native Tribal Health Consortium, health care consumers, and legal and meeting facilitation contractors. The core team and other statewide participants made up the Variations Work Group (VWG). This group developed a list of stakeholders who were invited to participate in a series of regional stakeholder meetings.

Four regional (Anchorage, Fairbanks, Juneau, and rural providers) stakeholder meetings were held to gather input on business practices currently in use around the state as related to the security and privacy of electronic health information exchange. Approximately 120 people participated in the stakeholder meetings, while others agreed to provide input on project draft documents via e-mail and through the project website.

Meeting participants were grouped by area of interest and work environment. The participants were asked to discuss scenarios provided by RTI International that dealt with health care issues relating to treatment, payment, RHIOs, research, law enforcement, prescription drug use/benefit, health care operations/marketing, bioterrorism, employee health, public health, and state government oversight. Participants were also asked to prioritize security and privacy issues that they felt were of utmost concern in HIE.

Issues identified during the scenario discussions were as follows:

After the statewide meetings, Ellen Ganley and Rebecca Madison of the core team drafted an Interim Assessment of Variations report. This report was widely distributed to participants from the original statewide meetings and to additional stakeholders throughout Alaska. The report was also reviewed by the core state project team, the VWG, the Legal Work Group (LWG), and the project steering committee. Input was collected via e-mail and Web forums. The report was submitted to RTI on November 6, 2006. Numerous financial, legal, and logistical barriers to HIE were identified and categorized within the report.

After reviewing the Interim Assessment of Variations report, the core State team formed an Alaska Solutions Work Group (SWG) to address the issues raised in the variations report. The Alaska SWG contains a variety of participants in the health care system, reflecting a cross-section of the population very similar to that of the core team and the participants in the statewide workshops. The SWG was tasked with addressing each of the barriers identified in the variations report and determining if they were actually barriers and, if so, how solutions to the barriers could be addressed.

Assisting in this task was the Alaska LWG, which included lawyers in private, government, and nonprofit practice, who met in a series of weekly meetings to address the issues raised as legal barriers. The LWG identified several of the legal barriers able to be addressed through state or federal law exceptions that allow the practice to continue or the barrier to be overcome. For the issues that remained as barriers, the LWG attempted to determine whether they should be addressed by legal, legislative, or business practices. This information was passed on to the SWG to assist with the identification of solutions.

The key solutions identified were as follows:


ARIZONA—SUMMARY

Arizona Governor Janet Napolitano signed an executive order in 2005, initiating the development of the Arizona Health-e Connection Roadmap, making the electronic exchange of health information a priority for the State of Arizona. A steering committee composed of major stakeholders was convened to develop the Roadmap.

The committee was charged with identifying legal, technical, and clinical practices that relate to electronic health information exchange (HIE). A key issue that emerged related to security and privacy concerns that arise from the electronic transfer of health information between health care entities (see Arizona Health-e Connection Roadmap, http://www.azgita.gov/tech_news/2006/4_5_06.htm).

The Arizona Health Privacy Project (AHPP) was launched in June 2006 with the Health Information Security and Privacy Collaboration (HISPC) contract. This award was part of the US Department of Health and Human Services project, Privacy and Security Solutions for Interoperable Health Information Exchange. To lead this Arizona effort, a state project team consisting of representatives from the Government Information Technology Agency; the Arizona State University's Center for Advancing Business Through Information Technology; and the law firm of Coppersmith, Gordon, Schermer & Brockelman, PLC, was chosen.

As required by the HISPC contract, the AHPP first convened the Variations Work Group (VWG) to generate information on security and privacy business practices across Arizona. The VWG reviewed 18 factual scenarios prepared by RTI International (the HISPC prime contractor), which were designed to elicit information about security and privacy practices in HIE. Working concurrently with the VWG, a Legal Work Group (LWG) was convened to evaluate potential legal issues for e-Health data exchange in Arizona. As a result of the information-gathering and analysis process conducted by the VWG and the LWG, the groups identified several critical issues that create barriers to the electronic exchange of health information in Arizona.

The VWG and LWG findings related to the principal barriers to information exchange that are detailed in the state's report can be summarized as follows:

Following the work of the VWG and the LWG, a Solutions Work Group (SWG) was convened to focus on identifying, proposing, and developing workable solutions to the identified barriers for HIE. The SWG and LWG held two work group meetings and augmented these discussions with conference calls between meetings to discuss the critical barriers and possible solutions.

The list of potential solutions generated by the SWG and LWG fell into 9 categories, all of which are explored in the report:

The next step is to convene an Implementation Work Group to create a plan to address the barriers identified by the SWG and LWG.


ARKANSAS—SUMMARY

Like many states, Arkansas is faced with crises in health and health care. Arkansas demonstrates high rates of diabetes, heart disease, and cancer. Many of these conditions result from behavior and lifestyle choices (eg, overeating, physical inactivity, consumption of tobacco products). The widespread expression of these diseases results in disproportionate utilization of services and increasingly burdens the health care system and impacts its ability to deliver quality care.

The health care culture would be positively changed by monitoring and documenting of the quality of care delivered and would be optimized by the development and implementation of an interoperable electronic health record (EHR). Use of EHRs has been shown to decrease costs, reduce medical errors, and improve access to care in systems in which they have been incorporated.

The opportunity from RTI International and the National Governors Association Center for Best Practices to participate in the Health Information Security and Privacy Collaborative (HISPC) allowed Arkansas to examine variations in laws and business practices related to privacy and security of health information exchange (HIE). Examination of variations in turn allowed Arkansas to determine potential solutions that would improve the status of electronic health information in the state through incorporation of interoperability standards and protocols. It is hoped that the Arkansas HISPC project will serve as a platform to facilitate ongoing efforts that will ultimately result in improved efficiencies of and access to care, decreased medical errors, enhanced continuity of care, and reduction in escalating health care costs.

In 2005 the Arkansas Center for Health Improvement (ACHI) was designated by the Arkansas Governor's Office as the HISPC project lead, which was to be in close partnership with the Arkansas Department of Health and Human Services (ADHHS) and the Arkansas Foundation for Medical Care (AFMC). These organizations already partner closely on a range of health-related projects, and their leaders regularly serve as advisors to policy makers in the state. In particular, ACHI and ADHHS have been instrumental in the success of the Healthy Arkansas initiative. AFMC leads a number of projects critical to advancing health information technology and also supports ADHHS by housing and analyzing data on Arkansas Medicaid recipients. The 3 organizations, with oversight and coordination by ACHI, were recognized as well positioned to organize stakeholders, examine challenges, and craft and implement pragmatic solutions intended to potentiate interoperability of HIE and, ultimately, improve the health of Arkansans.

In the initial request for funding, the Arkansas HISPC state project team set out a work plan and series of goals. With the submission of this report, all goals have been achieved in a timely manner, and the work plan is complete.

During the project period, the Arkansas HISPC stakeholder group was open to all those in Arkansas expressing interest. As a result of substantive recruitment efforts, membership of this group was both diverse and representative. The stakeholder group consisted of 125 interested parties from various health care communities, including hospitals, physician groups, clinics, pharmacies, payers, IT administrators, and others. In order to promote stakeholder group member retention and interest, the state project team utilized the Web portal made available by RTI. Stakeholder group members used the discussion forum to review the content regarding concurrence with or discrepancies identified in existing business practices. Members were also encouraged to use this tool to provide information on pertinent but unidentified business practices. Finally, all Arkansas HISPC work groups (Variations Work Group [VWG], Legal Work Group [LWG], Solutions Work Group [SWG], and Implementation Planning Work Group [IPWG]) were populated by members from the broader stakeholders' community.

During the course of the Arkansas HISPC project, the VWG held two meetings and identified more than 22 business practices impacting HIE in sites including but not limited to hospitals, community clinics and health centers, and pharmacies. Payer and consumer perspectives were also incorporated in the information assembled by the VWG. All 9 domains were impacted by the business practices identified as currently being used by Arkansas stakeholders.

The HISPC LWG was convened twice. The LWG served two distinct purposes, the first of which was to classify business practices identified by the VWG according to whether they acted as a barrier to HIE, were neutral to HIE, or functioned as an aid to HIE. After this initial classification, the LWG then identified what state or federal laws were implicated by those business practices. Nine business practices where designated by the LWG as barriers, 6 were designated as neutral, and 1 could not be assigned a distinct classification. Employing the legal expertise of the Brock-Chad Group and drawing upon the resources of its membership, the LWG was able to find specific state and federal laws that applied to most of the business practices. However, in some instances the LWG determined that supportive legal authority (authorizing, mandating, or prohibiting behavior) did not exist for certain practices.

The HISPC SWG held two meetings during the course of this project. The SWG was charged with developing recommendations to address the business practices identified as either barriers to HIE or neutral to HIE. The SWG examined each practice individually and, through an interactive brainstorming process, derived a series of potential solutions. The SWG then vetted and ranked these solutions on the basis of the state's ability to implement them.

The HISPC IPWG convened on 3 separate occasions to discuss the products derived serially and sequentially by the VWG, LWG, and SWG. The IPWG examined each recommended solution and crafted a series of implementation plans.


CALIFORNIA—SUMMARY

President George W. Bush issued an executive order on April 27, 2004, announcing his commitment to promote the use of health information technology to reduce medical errors, lower health care costs, and provide better information to consumers and physicians. The order called for widespread adoption of electronic health records and for health information to follow patients seamlessly and securely throughout their care. Similarly, Governor Arnold Schwarzenegger issued Exec. Order No. S-12-06 on July 25, 2006, to use HIT to improve patient safety and coordination of care, empower consumers, and guarantee timely access to care specialists. Most important, the governor's order highlighted his foundational pledge to identify and develop strategies to continue protection of the confidentiality and privacy of patients' health information for the purposes of health information exchange (HIE).

California's participation in the Health Information Security and Privacy Collaboration (HISPC) initiated diverse public and private health care industry involvement toward securing the privacy and confidentiality of personal information in HIE. Recognizing California's unique challenges due to its large population, geography, and industry, multiple stakeholders actively engaged in the 3 RTI International project phases of data collection, solutions analysis, and implementation plan development throughout the 8- month contract. The California state project team consisted of a public-private partnership between the California (State) Office of HIPAA Implementation and the California Regional Health Information Organization, which together managed the project. The team also included several nationally recognized legal, health, and technical experts, including Manatt, Phelps, and Phillips, LLP, the consulting firms of Object Health and Medical Management Services, and the RMA Consulting Group.

California is a recognized leader in the protection of personal health privacy. A strong commitment to patient privacy and the protection of health information is demonstrated in the state constitution and multiple statutes. However, state privacy law, often more stringent than the Health Insurance Portability and Accountability Act (HIPAA), has led to complex state and federal law interplay, often resulting in multiple and conflicting interpretations of applicable law. California stakeholders believe that such laws and corresponding business practices and policies are not barriers to HIE but instead represent California's commitment to strong individual-privacy protections. Moving forward, California's leaders recognize the foundational legal work that must be completed to create a new legal framework that will increase industry and public confidence in HIE.

The following summarizes the 5 major issues identified during the course of the RTI project.

Statewide privacy and security oversight body. The HISPC project established the first public-private infrastructure to address privacy and security issues. When potential solutions to address business practice variations were analyzed, it became apparent that the time frame for the project did not allow for adequate research, analysis, and testing of privacy and security solution options. To adequately address the solution options beyond the project's time frame, an oversight infrastructure is required.

Operations. By applying only to "covered entities," HIPAA created a distinction concerning which Privacy and Security Rules apply to which members of the health care industry. In addition, stakeholders reported business practice variations stemming from disparate interpretations and understandings of HIPAA, state law, and their intersection. Lastly, stakeholders reported business practice variations that result from entities' selecting different approaches to implementing the optional and addressable provisions in HIPAA.

Technology. Because HIPAA created different security standards for different entities, permitting different approaches to HIPAA implementation, common security standards designed to protect health information have not been established that apply to all data exchanges as part of an HIE. Common data architectural standards1 and detailed data classifications2 have not been developed to differentiate between information required to support financial transactions and information required solely for treatment. Further distinction necessary within treatment data and within standards for auditing, authentication, access, and the like have yet to be reached.

Complexity of laws. California has many statutes governing the privacy and security of information, some of which were designed for different purposes and do not harmonize well. HIPAA preemption complicates the interpretation and understanding of the applicability of state laws pertaining to privacy and security. As a result, entities base business practice policies on a variety of interpretations that direct the access, use, and disclosure of medical information. Widespread variation in interpretations was particularly evident among communities less experienced with collaboration and information exchange. Additional problems arise when health information is exchanged across state lines, as the number of applicable statutes and variations in legal interpretations compound.

Trust. California stakeholders concluded that there are certain situations in which dynamic tensions may arise between patient privacy and necessary disclosures of medical information. One factor that stakeholders believed inhibits development of HIE privacy and security standards is the "tension" that results from the conflict between a patient's right to privacy and a provider's responsibilities to disclose health care information for payment and health care operations activities. All stakeholders agreed that health information should be exchanged for treatment; however, there appeared to be a belief that the release for payment or health care operations would not be limited to the information or purpose stated for the disclosure, especially given the amount of information available through HIE. This issue should be resolved early on to prevent any further erosion of trust between consumers and providers.


COLORADO—SUMMARY

Colorado's statewide health information exchange (HIE) initiative is linking together diverse health care providers and platforms with a state-level, nonprofit oversight and operations entity, or hub, the Colorado Regional Health Information Organization (CORHIO). CORHIO leads development and will provide centralized operations for a federated interoperable HIE serving all of Colorado. Colorado is one of 6 state and regional demonstration (SRD) projects funded through contracts with the Agency for Healthcare Research and Quality. The SRD project—named the Colorado Health Information Exchange—provides technical expertise for development of the prototype point-of-care clinical data exchange that will become one of several types of HIE services supported by CORHIO. Other HIE types will include clinical and administrative messaging and population data exchange.

The privacy and security project's scope of work and methodology is built upon the structure, processes, timing, and significance of Colorado's HIE initiative and SRD project. CORHIO as a formal organization was recently incorporated and is on track to begin production-lab data exchange to meet terms of its AHRQ contract in fall 2007. The solutions outlined in the state report, as well as the project implementation plan to be reported subsequently, are key to successful implementation of Colorado's federated HIE network and state-level RHIO.

The first phase of the privacy and security project involved analyzing business practices and policies currently used by various Colorado stakeholders to protect health information. An additional task was to compile an inventory and analyze state and federal laws and regulations that relate to HIE. This analysis revealed numerous variations in organizational practices, as well as possible statutory and regulatory barriers to the successful implementation of a secure, federated interoperable environment.

Particular aspects of privacy and security HIE architecture were prioritized for attention and solutions development. Across these areas, solutions were categorized according to how and at what level they would be addressed in the context of single-state-level, multistate-level, and national-level interventions. Categories included the following.

Governance-related. These solutions are imbedded within CORHIO policies that establish conditions of participation for entities seeking to exchange information via the interoperable network.

Business arrangements. These solutions are specified as part of business practices and agreements between CORHIO and participating entities (including those individual entities and organizations that comprise a participating entity's network of business partners).

Technical. These solutions require technical design and implementation for CORHIO and participating entities.

Guidance/education. These solutions involve technical assistance materials; they also involve activities, including education and training, that promote implementation of agreed-upon policies and practices and that clarify legal and regulatory requirements.

Public policy development. These solutions require revisions to state laws and regulations, federal laws and regulations, or both.

In summary, priorities for state-level solutions include the following:


CONNECTICUT—SUMMARY

The Connecticut Health Information Security & Privacy Initiative is a collaborative project designed to assess how Connecticut's privacy and security business practices and policies influence the exchange of electronic health information. This initiative was a 3-phase project that defined the current health information security and privacy environment in Connecticut, assessed variations across business entities, identified barriers to legitimate flow of electronic health information, proposed solutions, and developed a proposed plan of action.

Connecticut's report, the final Assessment of Variation and Analysis of Solutions, is the culmination of 11 months of information collected through collaboration with both public and private stakeholders to assess the variation of health information exchange (HIE) business practices in Connecticut, as well as the development of solutions to the identified barriers. The state project team prioritized the 18 specified RTI International scenarios, which were used to facilitate work group discussions.

The following HIE barriers that had a current or potential impact in Connecticut were identified through work group discussions:

The solutions proposed in the state report focus primarily on patient care scenarios, as well as on variations discussed during the bioterrorism and public health scenarios. The process used by the state team to identify and propose solutions included the following: defining local use-cases; identifying applicable national and international privacy and security standards; defining information privacy and security solution architecture; defining a visionary work flow; convening stakeholders to define possible solutions based on standards; convening the Solutions Work Group to refine possible solutions; convening the Legal Work Group to evaluate solutions; engaging eHealth Connecticut (Connecticut's acting RHIO) stakeholders to evaluate the feasibility of and prioritize identified solutions; and organizing and presenting final proposed solutions.

The organizational-level solutions include the following:

The cross-organizational community and statewide solutions include the following:

The federal and state laws/regulations solutions include the following:

The interstate solutions include the following:

The national-level solutions include the following:


FLORIDA—SUMMARY

Project Background

Florida's Agency for Health Care Administration (Agency) was awarded a contract by RTI International to participate in the Health Information Security and Privacy Collaboration. This project is part of a national effort managed by the US Department of Health and Human Services, Office of the National Coordinator for Health Information Technology; the Agency for Healthcare Research and Quality; and the National Governors Association. Florida was one of 34 states and US territories responsible for managing the collection and analysis of data from the state's health care stakeholders on the variations in organizational business practices, policies, and laws related to the private and secure exchange of health information.

The Agency assembled a state project team that was knowledgeable about issues related to health information exchange (HIE) and that has experience in the business and legal areas of health information privacy and security practices. The state team took the lead on organizing core groups of health care stakeholders into work groups. These groups participated in facilitated meetings aimed at collecting data on how policies and laws related to HIE are applied in various situations across a variety of health care environments. The Variations Work Group (VWG) was given the task of reviewing health care exchange scenarios and identifying business practices related to each scenario. This group collected 168 responses to 22 scenarios representing approximately 473 different business practices.

The Legal Work Group (LWG) took each of the business practices that had been identified as a barrier to HIE and determined the legal challenges related to each barrier. The LWG found that the barriers were a result of inconsistent state and federal laws, misunderstanding or misinterpretation of policies or laws, and the inconsistent application of the policy or law in actual practice. The data collection from these expert focus groups was used to create a series of reports, including an Interim Assessment of Variation report (Deliverable 2) and the Interim Analysis of Solutions report (Deliverable 3). Copies of these reports are available at http://ahca.myflorida.com/dhit/Privacy_ss.shtml.

Purpose of Report

The purpose of the final Assessment of Variation and Analysis of Solutions report is to illustrate the variations in organizational-level business practices, policies, and laws 4  related to the private and secure exchange of health information. This final report includes an assessment of the variation in business practices, policies, and laws and an analysis of the solutions to the barriers caused by the variation. The report contains 8 main sections. Section 1 describes the background and purpose of the report. Section 2 is a description of the methodology used to collect and analyze the data presented, and a breakdown and analysis of each of the scenarios presented by RTI, including a description of the stakeholders' response to the scenario, the applicable domains, and the general observations of variations in practice and law. Section 3 summarizes the key findings from the assessment of variation. Section 4 includes an introduction to the analysis of solutions and describes the process of identifying and selecting solutions. Section 5 is an analysis of the state-level solutions, which is followed by a listing of the solutions that serve as national recommendations (Section 6). Section 7 summarizes the entire report and identifies next steps pertaining to the implementation of the proposed solutions. The appendix (Section 8) includes the analysis of the 4 Florida scenarios added by Florida's privacy and security team and a listing of the work group members.

Notable Observations

There were variations within and across stakeholder groups, variations related to the way privacy and security policies were applied to actual business practices as outlined in this report. Some of the variations resulted in barriers to HIE, such as inconsistent state and federal laws that resulted in variations in policy, misunderstanding or misinterpretation of policies or laws, and the inconsistent application of the policy or law in actual practice.

A legal barrier to HIE is a statutory or regulatory requirement that prevents the free flow of health information. In order to maintain the confidentiality of personal health information and thereby maintain consumer confidence in the health care system, legal barriers to HIE are a necessity. However, many of the laws regulating HIE were created prior to the advent of electronic HIE. Consequently, many such laws are narrowly focused and often prevent or delay, perhaps inadvertently, the free flow of HIE to those who would otherwise be authorized to access the health information. These delays are especially problematic if they prevent timely access to health care, subject people to the stress and hazards of unnecessary tests, and, in general, negatively impact people's health and well-being.

The solutions outlined in the report address the variations within and across stakeholder groups, variations related to the application of privacy and security policies and laws. Based on the types of barriers identified by the VWG and LWG, the Solutions Work Group identified solutions that address laws and regulations to facilitate HIE; technical issues related to the secure exchange of electronic health information; administrative or organizational barriers to exchanging health information; and the need for more education and greater public awareness of the rules and laws that address HIE.


ILLINOIS—SUMMARY

The Health Information Security and Privacy Collaboration (HISPC) was formed by contract between RTI International and 34 other states, including Illinois. The goal of HISPC was to assess and provide solutions that address variations in organizational-level policies and state laws that affect privacy and security practices, including those related to the Health Insurance Portability and Accountability Act (HIPAA), and that may pose challenges to the interoperability of health information exchange (HIE). The prevailing principle behind HISPC is that workable privacy and security approaches and business practices are imperative for comprehensive information exchange solutions to facilitate quality improvement, medical error reduction, timely surveillance, rigorous research, and improved efficiency and affordability of health care.

The Illinois Foundation for Quality Health Care was designated by the governor of Illinois as the coordinating entity for the HISPC project. The Illinois HISPC steering committee (HSC) was the reporting body for Illinois' contract with RTI. In addition, the HSC received oversight from the Illinois Electronic Health Records (EHR) Taskforce, which was created by the Illinois General Assembly in 2005 to make recommendations on statewide EHR activity. As part of their charge, the HSC provided RTI and the EHR task force with the following:

The HSC had under its purview several work groups to support its objectives. These work groups included a business Variations Work Group (VWG), a Legal Work Group, a Solutions Work Group (SWG), and an Implementation Plan Work Group (IPWG). The HSC determined the membership of the Work groups and reviewed and approved all work products resulting from the groups.

Business practices surrounding privacy and security of health information conducted by organizations in the state were captured and assessed by the VWG. Over 100 unique business practices among 30 representative organizations were discovered. The VWG determined that the uses of technology to capture, maintain, and share patient information vary tremendously among Illinois' organizations. As would be expected, business practices surrounding privacy and security of health information were discovered to vary according to the level of technology available to an organization. However, several common themes appeared, regardless of the level of technology available to an organization. The varying array of interpretation and sometimes misinterpretation of HIPAA was a common issue, sometimes even within the same organization. Also, for paper-based organizations, sharing of information was shown to be based significantly on established, trusted relationships. The level and method of sharing was revealed to be based more on familiarity between the existing parties than on established business agreements; therefore, a telephone call from a trusted person would garner the requisite information and perhaps more than required.

One of the key findings of this study of business variations is that Illinois has very strong protections to ensure that privacy and security are maintained during the exchange of health information. There are extensive laws that apply to Illinois providers, payers, and others, establishing rights and obligations with respect to maintaining patient privacy and with respect to confidentiality and security of patient health information. These laws drive HIE practices in Illinois and should be taken into account in discussions on necessary information technology parameters and requirements for national electronic HIE. However, because there is currently little electronic exchange of information between organizations, there are few operational examples of these protections as they relate to electronic HIE.

Silos of technology utilization were found throughout Illinois. Many health care organizations have been able to incorporate significant technological resources to maintain patient data. This finding is particularly true of the major urban health care facilities in the Chicago area. However, little effort has gone into enabling organizations to share data electronically with one another. The most salient reason for this lack is that the culture in Illinois has not been conducive to data sharing. Information often has been deemed as proprietary and a business asset, as opposed to being deemed an opportunity to improve quality of care and patient safety. Although there is evidence that this trend is shifting, the shift is occurring slowly and sporadically. The cultural change and technical infrastructure necessary for sharing information will need to come together before the policies and procedures necessary to facilitate HIE begin to become more commonplace.

Critical barriers to the implementation of interoperable electronic HIE were elucidated further by the work of the SWG. Barriers were confirmed to exist in organizational culture, in technology and standards, in lack of knowledge at both the staff and consumer levels, in organizational resources for health information technology (HIT), in leadership for privacy and security protection, in the global market, and in relation to state or federal law, primarily in misinterpretations and noncompliance. Root causes for these barriers were determined to include needs for proof of the benefits of regional HIE, development of technical and professional standards, consumer and staff education, inclusion of economically disadvantaged providers, quality assurance in HIT, and clear and concise legislation and enforcement thereof. The SWG developed solutions to address these specific needs and systematically prioritized them according to the maximization of patient care and outcomes, the feasibility of implementation, the maximization of privacy and security protection, the cost-effectiveness, the alignment with other state and national activities, and a reduced dependency on the accomplishment of other activities. The prioritized solutions forwarded on to the IPWG for implementation planning included the following recommendations:


INDIANA—SUMMARY

Indiana, as one of 34 states and territories to participate in the Health Information Security and Privacy Collaboration (HISPC), assessed current business practices and Indiana state laws that affect health information exchange (HIE). The assessment was based on the scenarios provided by RTI International, identified barriers revealed from those scenarios, and developed proposed solutions.

Current HIE landscape in Indiana. Indiana has many advanced systems for the exchange of clinical information for the treatment of patients and other authorized uses, and it has distinguished itself as a national leader in the HIE field. There are multiple regional health information organizations in various stages of development. Additionally, although several Indiana health care stakeholders operate sophisticated electronic health record (EHR) systems, a good number of Indiana providers still rely on paper records or some combination of paper and EHR.

Variations process. The Indiana HISPC state project team gained the participation of more than 40 individuals and organizations from across the state for the Variations Work Group (VWG) assessment of the current business practice of Indiana stakeholders, basing this assessment on discussion of the 18 scenarios provided by RTI. The state project team was able to secure the involvement of all stakeholder types except correctional facilities and consumers (despite efforts to do so). The state project team identified and logged more than 166 business practices related to the RTI scenarios.

Barriers and solutions. Overall, Indiana law is favorable to HIE and imposes few restrictions, relying instead on the Health Insurance Portability and Accountability Act; however, some problem areas were revealed during the scenario review process. The barriers are summarized below and are listed in priority order, along with the proposed solution.

There are several other barriers to HIE that are not privacy and security related, such as funding and financial sustainability issues. However, these issues are outside the scope of this project.

Barrier Solution
Federal Law: Drug and alcohol abuse treatment data are prohibited by 42 C.F.R. pt. 2 from being exchanged without consent, with consenting requirements being unclear. The way data is collected at mixed-use facilities also poses problems. • Amend 42 C.F.R. pt. 2 to provide that patient consent is not required to exchange the data for treatment purposes.

• As an alternative, explore Health and Human Services's authority to define the contours of consent.
Business Practice: Misunderstanding of mental health record consent law. Indiana law does not require consent for disclosure of mental health records • Develop a communication program to educate mental health providers that consent is not necessary.
Business Practice: Misunderstanding of communicable disease consent law. Indiana law does not appear to require consent for disclosure of HIV/AIDS or other communicable disease data. • Develop a communication program to educate providers that HIV/AIDS is not treated differently than other communicable disease data and that consent is not required.

• Could also amend Indiana law to make it clearer.
Ambiguity in State Law: Ambiguity in pharmacist laws on sharing medication history data. Indiana law permits sharing of pharmacist's data only when it is in the "best interest of the patient." • Amend Indiana law to regulate pharmacists' data under general medical records law, thus eliminating consent requirement.
State Law: Health Maintenance Organization (HMO) state law does not allow for sharing clinical data for research (eg, de-identified research) without patient consent. • Amend Indiana law to permit HMOs to share health data for research purposes without consent, so long as HIPAA is followed.

• As an alternative, work with HMOs and employer groups to help them understand the benefits of use of data for research, and encourage them to include patient consent for HIPAA-compliant research in their plan documents.


IOWA—SUMMARY

Overview

Iowa was one of 34 states selected for the Health Information Security and Privacy Collaboration (HISPC) project during 2006-2007 through funding from the Agency for Health Care Research and Quality (AHRQ) and the US Department of Health, Office of the National Coordinator for Health Information Technology (ONC). RTI International and the National Governors Association provided overall project management. The project focus was privacy and security issues related to electronic health information exchange (eHIE). These efforts align with the president's ongoing goal to expand the use of health information technology (HIT) in the United States to lower health care costs and improve quality. Privacy and security issues must be addressed in order for HIT and eHIE to advance successfully.

Participating HISPC states were asked to

Findings from all participating states will ultimately be compiled by RTI in an overall HISPC "roll-up" report for submission to AHRQ and ONC.

Project Leadership

The Iowa project was led by the Iowa Foundation for Medical Care (IFMC) as designated by the Governor's Office. A project steering committee and 5 work groups composed of key stakeholders contributed to all phases of project completion.

Iowa HISPC leadership structure was as follows:

Project Phases/Deliverables

The HISPC project phases were tied to a series of deliverables. This report was the final Assessment of Variation and Analysis of Solutions (Deliverable 5) as shown in the table below.

HISPC Deliverable Submission Date
1. Work Plan June 9, 2006
2. Interim Assessment of Variation November 6, 2006
3. Interim Analysis of Solutions January 15, 2007
4. Interim Implementation Plans February 14, 2007
5. Assessment of Variation/Analysis of Solutions March 30, 2007
6. Implementation Plans Due April 15, 2007

This report combines the content of Iowa's Interim Assessment of Variation and Interim Analysis of Solutions reports, but it further refines and expands on the interim findings. Copies of all Iowa HISPC reports are available from IFMC (e-mail: sbrown@ifmc.org).

Main Findings: Variations

The project revealed a wide range of practice variation and privacy and security barriers to eHIE in Iowa. The barriers were grouped into 5 main areas:

  1. operational: barriers that result from variations in business policies and practices and are related more to operational decisions by organizations than to legal requirements.

  2. legal: barriers that result from legal requirements; these may exceed the Health Insurance Portability and Accountability Act regulations, may be complex or confusing to providers, may be overly restrictive, or may vary by state.

  3. technological: barriers that result from limitations in the technology features that protect privacy and security of eHIE; or technology features that actually impede efficient eHIE.

  4. consumer-related: barriers that result from consumer perceptions about privacy and security of eHIE.

  5. provider-related: barriers that result from provider perceptions and the cultural rural aspects of the State of Iowa.

Main Findings: Solutions

The barrier framework was used to begin development of privacy and security solutions for eHIE in Iowa. Given the limited project time frame, Iowa work groups focused primarily on operational and legal matters, with the intent that these would address many provider and consumer concerns, as well. Solutions not fully addressed during the project will be carried forward as a continuation of HISPC work. All viable solution ideas were documented for future reference.

Privacy and security solutions to facilitate eHIE in Iowa were as follows:

Examples of proposed solutions included the following:

The remainder of the report provides detailed methodologies and findings related to Iowa HISPC variations, barriers, and solutions. Iowa's implementation plans will be provided in the final Implementation Plans report (Deliverable 6). That report will also include further details on the overall strategy for continuing Iowa HISPC work after the project contract concludes.


KANSAS—SUMMARY

In most of the United States, citizens' and businesses' readiness to electronically exchange clinical information is nonexistent. The business case for such a capability continues to be debated. Technology standards are still too numerous to be considered stable. Privacy concerns remain incompletely addressed. And there is widespread uncertainty about the legal requirements surrounding disclosures of such data. Nevertheless, a substantial portion of the industry and the general population believe that electronic exchange of health data is something worth doing.

Kansas, like most states, is host to a handful of organizations making fledgling attempts to develop local or regional health information exchanges (HIEs). The state itself has sponsored a number of initiatives to help promote these activities. Nevertheless, Kansas, like most other states, has not yet produced a viable, generalizable HIE process. The broad lack of transformation to electronic means of exchange offers an opportunity, however. Kansas stakeholders are (1) keen to begin the process, (2) seeking best practices that will not be outdated in the midterm, and (3) unencumbered with legacy systems that would color their views or would have to be replaced by a future statewide approach.

The Health Insurance Security and Privacy Collaboration (HISPC) project was oriented around discussions of 18 hypothetical scenarios that would precipitate the exchange of protected health information. For each scenario, 9 "domains" (or "design dimensions") were considered, including 7 technical dimensions and two legal dimensions. Through participation in the HISPC Variations Work Group and the Solutions Work Group, a core set of more than 30 Kansas stakeholders (joined by an equal number on a less regular basis) engaged in these discussions. The stakeholder collaborations themselves are understood to be primary products of the HISPC process, and these collaborations are expected to outlive the project itself.

Plans for implementation of solutions generated by the Kansas HISPC discussions are under development. On February 7, 2007, Governor Kathleen Sebelius announced formation of the Kansas Health Information Exchange Commission. This group will be tasked with expanding on the work and implementing the recommendations of previous initiatives to promote the electronic exchange of health information while assuring its privacy and security.

Kansas stakeholders identified hundreds of variations in business practices that were seen as potential impediments to the adoption of health information technology. These tactical issues were reorganized by the Solutions Work Group into 4 strategic areas: patients, business operations, legal issues, and regional issues. The Kansas state team believes that successful solutions will be those that gain consumer acceptance and create market demand for new information products and services. It intends to encourage Kansas stakeholders to continue to invent modest local and regional "pilot" solutions. By empowering these pilot solutions and initiatives, the state team hopes to foster better understanding of their feasibility, share lessons learned, and extend successes.

One benefit of HISPC will be the establishment of a strategic framework for conducting these demonstration projects, for sharing lessons learned, and for producing one or more interoperable models for HIE. In this way, it is hoped that some risks in investment and promoting growth of HIE best practices will be mitigated.


KENTUCKY—SUMMARY

Health care is the only industry of its size still dominated by paper, phone, fax, and mail. Most American clinicians still rely on file folders with handwritten notes, paper prescriptions, and incomplete patient histories stored in file cabinets. While patients and physicians benefit from sophisticated technology to diagnose and treat disease, the relatively basic information technology necessary to record, store, share, and protect health information electronically remains the exception and not the rule.

In Kentucky, rising health care costs; concerns over access to quality, affordable care; and poor health outcomes led a bipartisan group of leaders in the General Assembly and officials in Governor Fletcher's administration to work together on e-Health as a solution.

On March 8, 2005, Governor Fletcher signed Kentucky's landmark e-Health legislation, known as Senate Bill 2 (SB2), which authorizes the creation of a secure, interoperable statewide electronic health network. SB2 also created the Kentucky e-Health Network Board to oversee e-Health efforts in the state. Led by clinical leaders from Kentucky's two major research universities—the University of Louisville (U of L) and University of Kentucky (UK)—the e-Health board consists of a number of public- and private-sector health leaders and is attached to the Cabinet for Health and Family Services (CHFS).

Kentucky e-Health Privacy and Security Collaboration

One of the first projects undertaken by the e-Health board was the Kentucky e-Health Privacy and Security Collaboration. In May 2006, Kentucky was one of 33 states awarded a contract to participate in the Health Information Security and Privacy Collaboration, a federally funded collaboration involving the Office of the National Coordinator, the Agency for Healthcare Research and Quality, RTI International, and the National Governors Association. Governor Ernie Fletcher designated CHFS as the project manager but requested that CHFS staff work collaboratively with faculty from U of L and UK on the project.

Under federal contract requirements, Kentucky was responsible for organizing a large group of Kentucky stakeholders to participate in a number of work groups and committees with specific responsibilities for portions of the project:

Kentucky's e-Health Privacy and Security Collaboration Stakeholder Community consisted of more than 60 volunteers and staff from a wide variety of stakeholder organizations and backgrounds. The Kentucky report is a result of this nearly year-long collaborative project. The goal of the project is to assess at the state and local levels how privacy and security practices and policies affect health information exchange (HIE). The main objective of this report is to outline the findings from the assessment of variations in business policy and practice and to provide an overview of various solutions and functional steps possible to address the privacy and security issues that may affect and impede HIE in Kentucky.

Findings and Recommendations

For technology to improve the efficiency and quality of health services to the greatest degree possible, HIE must be largely instantaneous and automatic. This ability is facilitated largely by the use of a set of recognized rules, or standards, among organizations, including standards for protecting the privacy and security of the information. This project identified the following important findings and recommendations regarding the challenges related to various HIE situations.

Widespread Misunderstanding and Confusion Concerning State and Federal Laws on Privacy and Security of Health Information

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provided baseline protections for health information across the United States, but other state and federal laws also contain provisions regarding the privacy and security of protected health information (PHI). Project participants expressed great concern regarding the large number of differing standards and interpretations between state and federal laws protecting health information. Multiple state or federal laws and regulations that deviate significantly from the baseline privacy and security protections that HIPAA provides can be particularly problematic in an electronic information environment.

Health care providers and practitioners in particular expressed a great deal of uncertainty about when patient data may be released and to whom. Issues arose regarding the release of information to payers for administrative purposes, as well as for organizations to monitor patient management. Release of information for nonmedical purposes, such as to police, parents of adult children, employers, marketers, and government agencies, was also particularly problematic.

Issues Related to Handling of Sensitive PHI

Particularly sensitive areas of protected health information include information related to mental health, substance abuse, HIV/AIDS, sexually transmitted diseases, and some other communicable diseases. These types of sensitive conditions are afforded special protections because of the stigma and potential negative consequences of inappropriate information disclosure. While agreeing that special protections for sensitive health information are important, project stakeholders also noted the difficulty of ensuring compliance with all the provisions found throughout state and federal law related to sensitive PHI. The differing provisions and standards for appropriate disclosure mean that, when in doubt, health organizations do not share any health information. However, this policy could affect greatly both the continuity of care and the quality of care provided as electronic HIE becomes customary. Some participants urged the development of a more coherent set of standards around sensitive PHI. Such standards could have two positive benefits: (1) ensuring to a greater degree that sensitive PHI is afforded the special protections it deserves and (2) making it easier for health organizations to comply with the law.

Technology Limitations Related to Electronic Information Exchange

The project examined many limitations to currently available health information technology (HIT). Identity management is an issue for any technology application, but it is especially important with health information, where life and death matters are at stake. Determining policies and practices for appropriate access, authentication, authorization, and auditing for information systems is critical to protecting the privacy and security of electronic health information. In addition, interoperability is a critical issue to HIE because health information systems currently cannot easily communicate with one another. The lack of a standard way to match patient records across health organizations is another technology challenge. Finally, there are associated problems with the various types of data transfer and with ensuring secure transmission.

Relative Silence in Law on HIE

Much of Kentucky law and regulation governing health care and public health assumes and reinforces a paper-based environment rather than an electronic environment for health information management. Emerging practices such as e-prescribing, HIE, regional health information organizations, and personal health records are so new and dynamic that clear legal parameters simply do not exist yet. Without clear policy guidance, health organizations may be reluctant to move aggressively into the world of e-Health. In some cases, law and regulation may simply be outdated and may not have changed in decades to reflect current practices. The process of updating privacy and security statutes and regulations is difficult because these statutes and regulations are scattered throughout state codes.

Concern Regarding Business Risk and Adverse Legal Action If Information Is Exchanged

The ambiguities between state and federal law, the current limitations to technology, and the newness of e-Health mean that there are inherent risks to early adopters of HIT and HIE. While many providers, administrators, and practitioners have managed to deal with these challenges, there is an underlying concern that a specific situation may uncover hidden problems and may expose health care entities both to unanticipated risk of their business reputations and to adverse legal action.

A number of solutions were proposed by stakeholders as ways to address the issues and challenges identified through this project. A key means to address the issues and implement proposals will be through the statutorily required Privacy and Security Committee of the e-Health Network Board. This committee will be appointed by the e-Health board in April 2007 and will be charged with addressing the issues identified by the state report, and with implementing recommendations from a state implementation plan (forthcoming). Several categories of action defined in the report are as follows:


LOUISIANA—SUMMARY

Purpose of This Report

In the summer of 2006, the Louisiana Department of Health and Hospitals was awarded a contract by RTI International to participate in the Health Information Security and Privacy Collaboration (HISPC) funded by the US Department of Health and Human Services, Office of the National Coordinator for Health Information Technology (ONC); the Agency for Healthcare Research and Quality (AHRQ), and the National Governors Association.

Louisiana is one of 34 states or territories leading local efforts to collect information on business practices surrounding health information exchange (HIE) security and privacy. Collected from a wide variety of stakeholders, the objectives of the project are to

  1. identify common barriers to HIE,

  2. propose solutions to reduce and eliminate these barriers, and

  3. assemble implementation plans to extend the impact of this work beyond the current project.

The final Assessment of Variations and Solutions report provides a summary of the work completed on Objectives 1 and 2 by the Louisiana HISPC state project team and more than 200 stakeholders from throughout Louisiana.

Background on HIT Development in Louisiana

The massive shift of population and loss of medical information after Hurricanes Katrina and Rita made clear the need for interoperable electronic health information in Louisiana. At least 14 major efforts are currently under way in the state, such as the ONC-funded Louisiana Health Information Exchange, the AHRQ-funded Bayou Teche Community Health Net, and the Centers for Medicare & Medicaid Services Doctor's Office Quality IT Project. In addition, several large private multisite systems in Louisiana connect thousands of health providers electronically through proprietary networks. Despite this activity, most providers—especially those in rural areas or in solo practice—do not have access to electronic health information, and most Louisiana consumers do not yet fully benefit from health information technology (HIT) and HIE.

Common to all public and private HIT/HIE efforts in Louisiana are institutional, professional, and consumer concerns with the security and privacy of medical information that will be exchanged electronically at an increasingly rapid rate in ever increasing volumes. While most current public and private HIT/HIE efforts statewide address security and privacy independently of each other, the very nature of interoperability demands that interested stakeholders statewide collaborate on these issues.

Methodology

More than 200 stakeholders from throughout Louisiana participated in the Louisiana HISPC project. Over the course of 8 months, these stakeholders met on a regular basis in order to outline their current health information security and privacy practices, as well as identify barriers to HIE as related to security and privacy practices and their root causes. Stakeholders brainstormed and prioritized solutions to these barriers, using a rigorous process to assess their feasibility and potential impact. Finally, the stakeholders worked to develop work plans to actually put these solutions into practice.

Summary of Top Barriers to HIE

Overall, stakeholders identified and prioritized 38 barriers to HIE. The work groups prioritized these barriers, and the top 11 are as follows:

  1. verification of identify, authorization, access control, and auditing

  2. variations in standard HIPAA procedures between organizations

  3. handling of sensitive protected health information (PHI): conflicting state laws, policies, technical limits

  4. unclear distribution of legal liability between entities exchanging PHI

  5. Louisiana law as lacking provisions specifically providing an exception for continuity of care

  6. handling of patient opt-out: policies, procedures, and technical limits

  7. public perception and unawareness of security and privacy rights and obligations

  8. authorization for release of PHI for deceased individuals

  9. lack of clarity by the courts regarding standards and obligations

  10. unclear definition of the minimum necessary amount of PHI

  11. lack of consensus on who owns PHI

Major Themes

Several major themes were identified during the barrier identification, prioritization, and root-cause analysis process:

  1. Large resource and capability gaps exist between payers, hospitals, and smaller providers. While the Health Insurance Portability and Accountability Act (HIPAA) provides for "scalability" to allow for flexibility between different organizations with different missions and means, there is general consensus that outcomes do suffer in smaller organizations where there is not sufficient human capital to implement privacy and security procedures compliant with HIPAA and state law.

  2. The type, size, volume, regularity, and clinical importance of information exchanges vary by stakeholder type. This issue has implications for how Louisiana prioritizes the elements in its HIE development process, and a cost-benefit/risk assessment is in order.

  3. Differences in identity verification, authorization, access control, and auditing processes may produce security and privacy gaps. Since the chain is only as strong as its weakest link, it was understood that once information leaves the sending organization it is subject to the possibly weaker security and privacy practices of the receiving organization. As HIE efforts expand beyond the 4 walls of large providers into small doctor's offices and other ancillary organizations (or into patients' homes), the number of potential points of vulnerability will increase exponentially.

  4. Lack of regulatory guidance and case law results in widely different interpretations of simple HIPAA-driven procedures. In certain cases, the exchange of information between infrequent exchange partners may lead to barriers to the exchange of information. It is likely that variation in interpretation leads to unnecessary costs of implementation and to vulnerability to breaches of confidentiality.

  5. Consumers are largely unaware of the issues surrounding health information privacy and security, including their rights and obligations; and providers, government, and other health care entities have little understanding of consumer security and privacy expectations.

  6. "Sensitive" PHI is hard to define, and it is procedurally and sometimes technically difficult to carve out. The largest variations between organizations and states may exist here, as well as in the roles and minimum data sets defined by each. Differences in laws and regulations between states may be especially burdensome at border cities.

Summary of Solutions

Once the identification of business practices and barriers to HIE was completed, a second set of stakeholders was asked to convene to develop solutions to these barriers. While 16 detailed solutions are presented in the state report, they may be categorized under one of 4 major solutions:

  1. Establish a Louisiana Health Information Technology and Exchange entity that will serve as a collaborative forum to promote HIT/HIE use and the adoption of a common HIT/HIE framework and principles.

  2. Immediately convene current Louisianan HIE/HIT projects to adopt a common security and privacy framework.

  3. Promote the adoption of electronic medical records and best-in-class privacy and security practices in small and rural providers.

  4. Establish a Health Information Committee under the Louisiana State Law Institute.

Conclusions and Next Steps

The information in this report can only summarize the countless hours of time and effort in and out of formal work group meetings, hours and efforts which were provided by hundreds of stakeholders throughout Louisiana, and it inadequately reflects the strength of the new working relationships and understanding of Louisiana's current HIT/HIE infrastructure and capacity.

Louisiana is further ahead in its HIT/HIE capability and planning than most stakeholders might have believed prior to this project. As a result of Hurricanes Katrina and Rita, Louisiana faces an unprecedented opportunity and challenge to rebuild much of its statewide health system from the ground up. It is expected that the solutions and work plans developed from this effort will be important contributions to this effort, and the hope is that the collaborative effort over the past 8 months will continue to serve Louisiana beyond the life of this project.

At the time of this report, implementation planning is moving forward in conjunction with work resulting from the Region I Health Care Redesign Collaborative and the 2007 Louisiana legislative session. Final work plans will be delivered in the final Implementation Plan report due mid-April 2007.


MAINE—SUMMARY

Background, Purpose, and Scope of Report

The Maine report was designed to provide a synopsis of the solutions proposed by the State of Maine to the business practices identified as barriers to health information exchange (HIE). This report also described solutions for practices that were identified as part of the variations process and that do not necessarily inhibit HIE but do have a privacy and security component to them, specifically in regard to practices surrounding privacy, security, and confidentiality of protected health information.

The Maine state project team also included a description of the extensive dialogue that has occurred over the statewide initiative to integrate clinical information (HealthInfoNet). During the variations identification and compilation process, there were many questions about HealthInfoNet and how it would be governed. The business practices that would relate to this nascent entity were understandably sparse. The Solutions Work Group presented many proposals on how to carry out HIE between stakeholders and a statewide regional health information organization.

Level of Health Information Technology Development in Maine

Maine has been working for the last 2 years on implementing the capacity to facilitate timely exchange of patient clinical information. A 2004 joint publicly and privately funded feasibility study showed strong stakeholder support and diverse community buy-in for integrated electronic health information systems. Following these beginning efforts, Maine's statewide HIE project has continued to plan and develop processes for system governance, technical system requirements, and consumer engagement, while stressing stakeholder involvement and financial support.

Maine's HealthInfoNet project is dedicated to the creation of an integrated statewide clinical-information-sharing infrastructure as a means to improve the quality of health care, enhance patient safety, moderate the growth of costs, and make health care information available to consumers. HealthInfoNet's mission statement calls for an interconnected, secure data-sharing network of health care providers, public health professionals, consumers, payers, and affiliated services, permitting rapid access to patient-specific health care data at the point of care and across networks, hospital systems, and state lines.

Realizing that privacy and security represent core technical components and key concerns that need to be addressed by integrated clinical information networks, the Governor's Office designated HealthInfoNet to respond to the Health Information Security and Privacy Collaboration request for proposal (from RTI International). As one of the state teams awarded this contract, HealthInfoNet has been working throughout Maine in close collaboration with stakeholders likely to be interested in or affected by an integrated statewide clinical-information-sharing infrastructure.

The goal of the contract is to develop an understanding of business practices in the health care arena throughout the nation, as those practices relate to privacy and security associated with clinical information exchange. RTI shares HealthInfoNet's belief that health care is at its core community based, that its delivery is people-centered, and that practices involving privacy and security of patient information and solutions to these issues will be handled in communities. RTI has provided a common tool set, a structured framework, and a responsive contract liaison to aid in identifying barriers to information interchange and, as the project moves forward, in proposing and implementing solutions to these identified barriers.

HealthInfoNet has assessed variation in information exchange practices for Maine by bringing together key members of the health care delivery community in the state, including providers, payers, state government, public health, emergency medical services, health care legal counsel, laboratories, pharmacies, consumer advocacy groups, and others. It has used this active group of health care experts to propose ways to best resolve practices that are barriers to HIE.

Report Limitations

The state report is inherently limited. Despite many attempts at statewide inclusion, some voices may not have been heard. The state project team remains concerned about the absence of the Veterans Administration (VA) as a voice in this project and has continually reached out to representatives from the VA for direct dialogue. Care providers serving regions of the state with statistically significant Native American populations did provide input on unique issues that interactions with these independent nations may present.

Time, funds, and personnel commitment also remain limiting factors. In spite of these limitations, the state team has found that its regional dialogue about this project with fellow grantees New Hampshire and Vermont, as well as ongoing discussions through conference calls and Web interaction with all the contract grantees, continues to identify recurring and common themes in most areas of statewide HIE.


MASSACHUSETTS—SUMMARY

Several Massachusetts organizations are currently conducting electronic health information exchange (HIE) in the commonwealth. Private-sector organizations have invested significant time and resources in HIE projects that move interoperability forward through both pilot initiatives and production systems.

In the public sector, the Commonwealth of Massachusetts Executive Offices of Health and Human Services (EOHHS) created a Web portal for health and human services programs, known as the Virtual Gateway. The Virtual Gateway is intended to provide a single access point to all EOHHS initiatives for consumers, providers, legislators, and researchers.

In accordance with stakeholder input and project team analysis, the Massachusetts Health Information Security and Privacy Collaboration (MA-HISPC) identified 4 issues as key barriers, sources of variations in business practices, or key public policy concerns: (1) patient consent to the use of HIE networks, (2) use and disclosure of sensitive medical information, (3) implementation of access controls, and (4) application of community standards.

In accordance with the state team's analysis of these 4 key issues, the team identified 4 categories of solutions that, when applied to each type of barrier, will markedly advance HIE in the commonwealth: legal, technical, policy, and education. It has identified in each category solutions that will apply to each of these barriers. Additionally, MA-HISPC consistently found that stakeholders manage health information with markedly differing interpretations of the Health Insurance Portability and Accountability Act, other federal laws, and state laws. Thus, a set of solutions around policy development that will support operations and education for the consistent implementation of these laws is in order. Finally, the development and implementation of a comprehensive communication strategy was identified as a critical component of all future work.

After further consideration of these 4 barriers, MA-HISPC has now focused its implementation planning on two priority areas: (1) patient consent for the use of HIE networks and (2) use and disclosure of sensitive health information. MA-HISPC feels that each area must be addressed through legal, technical, policy, and educational solutions. At each stage of the work and discussions–Variations Work Group, Legal Work Group, Solutions Work Group, and now Implementation Plan Work Group–the MA-HISPC project determined that these two areas need to be addressed before true interoperable electronic HIE is possible in Massachusetts. The recommended solutions and implementation plan include the following elements.

For the area of patient consent,

For the area of sensitive health information,

The MA-HISPC has developed a preliminary implementation plan that includes use-case scenarios and work groups to develop clinical, policy, legal, and technology work product. The plan will be shared with communications and education task forces to inform their processes. This work will enable implementation of solutions while Massachusetts coordinates its work with other states and with national initiatives.


MICHIGAN—SUMMARY

The purpose of this summary is to document the Michigan Health Insurance Security and Privacy Collaboration (HISPC) team's assessment of variations and solutions regarding privacy and security barriers in the electronic exchange of health data. By discussing the scenarios provided by RTI with a comprehensive group of stakeholders from all regions in the state, the Michigan HISPC state project team was able to identify, categorize, and summarize a list of 10 major barriers for discussion by the Solutions Work Group.

The Solutions Work Group consisted of a broad spectrum of health care-related stakeholders and volunteers from the variations participants. In addition, extensive research into consumer reaction was included in Michigan's final report.

One of the team's biggest challenges was managing the size and complexity of Michigan. Michigan has a diverse population, which represents more then 80 different nationalities, cultures, and ethnicities, including a wide array of socioeconomic groups and every major form of health care delivery. Fifty-seven of Michigan's 85 counties are rural, where some of our most advanced work is being developed in health information exchange (HIE). Michigan's urban center, Detroit, leads the list of underserved populations, while our suburban centers provide cutting-edge delivery just a few miles away.

Additionally, this project helped foster interest in the governor's commitment to improving Michigan's quality of care and patient safety by utilizing HIE. In the original proposal, Michigan states that "the State of Michigan is pleased to be included in the work of this project as it aligns with the goals and mission as set forth by Governor Granholm to advance health care into the 21st century using technology to effectively, efficiently and privately share critical health information in Michigan." The absolute truth of this statement grew to almost monumental proportions during the course of this engagement. The Michigan HISPC project helped foster, or at least provided support to, the following related projects.

The Michigan Health Information Network Conduit to Care

In April 2006, the Michigan Department of Community Health (MDCH) and the Michigan Department of Information Technology (MDIT) brought together Michigan stakeholders to develop a vision and plan for the future of health information technology and exchange in Michigan, a report called the Michigan Health Information Network (MiHIN) Conduit to Care.

The report is a roadmap for engaging all regions of the state in HIE that will allow for the efficient, secure, and electronic transfer of health information between disparate entities involved in a patient's care. With the patient's consent, pertinent health information can be available to physicians at the point of care. The overall goal for the MiHIN initiative is to improve the overall quality of health care and increase patient safety.

MDCH and MDIT are currently working with the MiHIN participants to prioritize recommendations and develop strategies for moving forward.

Health Information Technology Commission

In May 2006 the Michigan Health Information Technology Commission was created by Public Act 137-06 as an advisory commission within the MDCH. The mission of the commission is "to facilitate and promote the design, implementation, operation, and maintenance of an interoperable health care information infrastructure in Michigan." The health information technology (HIT) commission was appointed by the governor in August 2006 and met for the first time in October 2006. Each commissioner represents a class of stakeholders, including consumers, providers, payers, employers, and hospitals, among others. The HIT commission plans to work with communities and stakeholders to reduce barriers and challenges to HIE and promote the growth of HIE across the state.

All HIT commission meetings are open to the public; the commission therefore has been able to encourage stakeholder feedback at each of its meetings. Also, the commission has invited and plans to continually invite regional HIEs to present information to the commission about their initiatives and the challenges and successes they have experienced.

Michigan HIE Resource Center

The Michigan HIE Resource Center will be focused on assisting the regional HIE efforts across the state by providing assistance and knowledge in order to increase the adoption rate and successful implementation of regional HIEs across Michigan.

Using a portion of the $5 million available in the fiscal year 2007 MDCH budget, MDCH issued a request for proposals in December 2006 to implement the Michigan HIE Resource Center. Proposals were due at the end of January 2007 and awarded in March 2007.

The HIE Resource Center will play a major role in supporting regional information exchange, a critical component of health care efficiency, by offering guidance to align with national standards, resolving any conflicts between regional HIEs, and facilitating equitable and appropriate data sharing for the benefit of patients.

The HIE Resource Center will support the State of Michigan's role as convener and collaborator for Michigan HIE. This centralized body will have the ability to bring different regional exchange initiatives together by providing parameters, guidelines, and support, bridging gaps between regional efforts that are in various stages of development. The Resource Center will promote sustained efforts to (1) build governance structures; (2) coordinate national, state, and local efforts; (3) promote education; (4) foster collaboration among stakeholders; (5) raise consumer awareness; and (6) develop financial and human resources. It will engage a variety of people, including full- and part-time staff, work group volunteers, student interns, subject matter experts, faculty, and consultants to keep abreast of national trends and local issues. Participants from previous and ongoing efforts, including MiHIN work groups, State of Michigan departments, local regional health information organizations, and participants in the HISPC project, will be drawn upon to move the process forward.

Regional HIEs Implementation and Planning Grants

Michigan's fiscal year 2007 MDCH budget contains $5 million to support regional HIE initiatives. In December 2006, MDCH released a request for proposals to provide planning or implementation grants to support Michigan regions in the HIE endeavor. The grants are due to be awarded in April 2007.


MINNESOTA—SUMMARY

In 2005 the governor and the Minnesota legislature made e-Health a state priority by establishing the Health Information Technology and Infrastructure Advisory Committee (Minnesota e-Health Advisory Committee) 5  in Minn. Stat. § 62J.495. The Minnesota e-Health Advisory Committee is charged with advising the commissioner of health on health information technology issues and goals. One of the committee's responsibilities is to address critical issues related to the security and confidentiality of health information and patient privacy requirements in this new era of electronic health information exchange. The Minnesota Privacy and Security Project (MPSP) is a first step in fulfilling this responsibility.

Health industry stakeholder and consumer involvement in the MPSP has been critical to ensuring that project results are broadly acceptable and applicable to the community. The MPSP was structured to provide all interested individuals the ability to participate directly and follow the project activities through its website at http://www.health.state.mn.us/ehealth/mpsp/index.html.

The MPSP was launched with Minnesota's award of a Health Information Security and Privacy Collaboration (HISPC) contract to examine privacy and security issues related to health information exchanges. The HISPC contract is part of a US Department of Health and Human Services project titled, Privacy and Security Solutions for Interoperable Health Information Exchange. 6  The Minnesota e-Health Advisory Committee serves as the steering committee for the activities of the HISPC contract.

Under the Minnesota e-Health Advisory Committee's direction, the MPSP conducted a systematic and comprehensive review of current laws and practices to identify the most significant privacy and security barriers facing organizations in the implementation of electronic exchange of health information.

The state's final report was an integration of the MPSP's first two reports titled, Privacy and Security Barriers to the Electronic Exchange of Health Information, and the Interim Report on Solutions to Barriers to the Electronic Exchange of Health Information.

At the end of the project's first phase in October 2006, the MPSP issued a report titled, Privacy and Security Barriers to the Electronic Exchange of Health Information. This report identified the two most significant privacy and security issues that must be solved to advance the appropriate electronic exchange of health information:

  1. The implementation of Minnesota's patient consent requirements within a health information exchange is an issue:
  1. Operational difficulties in first providing and then limiting and monitoring external organizations' electronic access to patient data is an issue. This issue is identified as one general issue, because it is a set of interconnected security problems that must be addressed concurrently to successfully implement a health information exchange. To give external health care providers appropriate access to electronic health records and patient data, organizations need to address 4 security topics, for which there are no fully adequate solutions:

During the second phase of the project, the MPSP convened a Solutions and Implementation Plans Work Group to develop solutions that eliminate or reduce these two privacy and security barriers while preserving and strengthening patient privacy protections. The Solutions and Implementation Plans Work Group formed two subgroups to address each of the barriers individually.

The Patient Consent Subgroup

The Patient Consent Subgroup examined differences between health care providers' interpretations of requirements for patient consent to exchange patients' health information. This subgroup proposed a number of modifications to Minn. Stat. § 144.335 to resolve differences between health care providers regarding "when" and "how" patient consent is required in order to exchange patients' health information. The potential solutions address 9 specific patient consent issues by

The Authorization, Authentication, Access Control and Auditing Subgroup

The Authorization, Authentication, Access control and Auditing Subgroup developed a set of 19 principles for authorizing and authenticating individuals, setting access controls, and auditing in a health information exchange. These principles provide Minnesota health care organizations a foundation and framework for the continued development of health information exchanges and can guide organizations' decision making in forming and implementing health information exchanges. The general principles form a "conceptual solution" that was developed to be

The efforts of these two subgroups will help to eliminate or reduce the two most significant privacy and security barriers to the electronic exchange of health information in Minnesota. In April 2007 the MPSP will issue a final implementation plans report that identifies and describes mechanisms and plans for implementing the solutions outlined in this earlier work.


MISSISSIPPI—SUMMARY

As the use of health care technology expands in complexity and in provider dependence on technology for care, the creation of an interoperable information network for the secure exchange of patient information becomes increasingly important. The creation of a centralized, secure, interoperable information network utilizing fully functional EHRs has the potential to improve the efficiency and efficacy of health care delivery by improving health outcomes and decreasing costs. As noted by David Brailer, the former National Health Information Technology coordinator, the United States is in the process of creating a "point of care" information network by which practitioners and clinicians will have real-time access to critical health care data to improve patient care and safety. Standards regarding the way information is transferred, the type of information to be transferred, and privacy and security issues surrounding this information must be addressed in an inclusive manner.

In February 2006, RTI International released a request for proposal entitled, Health Information Security and Privacy Collaboration (HISPC). This project is part of a national collaborative involving the National Governors Association; the US Department of Health and Human Services, Office of the National Coordinator for Health Information Technology; and the Agency for Healthcare Research and Quality. The Office of the Governor for the State of Mississippi designated Information & Quality Healthcare (IQH) as the entity to apply for the subcontract with RTI. IQH, together with 33 states and a single territory, was notified in May 2006 that its proposal to represent Mississippi on the HISPC initiative had been accepted.

The Foundation for eHealth Initiative conducted a preliminary assessment in 2006 of health information exchange in Mississippi. This preliminary assessment found that information technology (IT) integration in rural Mississippi reflects IT integration in rural America in general. The transfer of personal health information is limited to fax or e-mail. Few rural health care providers have a fully integrated EHR. Consequently, the secure and timely electronic transfer of protected health information (PHI) is limited by the lack of connectivity, lack of health information technology (HIT) integration, lack of trained IT personnel, and lack of funding.

The eHealth Initiative, the Southern Governors' Association Gulf Coast HIT Task Force, and the HISPC Interim Assessment of Variations report show that there are varying degrees of regional or community-specific health information exchange (HIE) activities in the state (24 HIT/HIE activities are currently under way in Mississippi, and several of these were initiated in the aftermath of Hurricane Katrina); there are silos of HIE activity with possibly some crossover; and there is no coordinated statewide HIE activity. No centralized entity currently exists in Mississippi to oversee the implementation of a secure, integrated, interoperable health information network and infrastructure.

The HISPC initiative requires 4 broad tasks for IQH to undertake: Task 1—Assess variation in organizational-level business policies and state laws regarding the transmission of health information, and identify barriers, business practices, or policies which impede health information exchange; Task 2—Formulate interim solutions and implementation plans to overcome the barriers; Task 3—Formulate final solutions and implementation plans; Task 4—Manage the project. To accomplish the tasks in the initiative, 4 work groups have been established: Variations Work Group in assessment of business practices; Legal Work Group; Solutions Work Group; and Implementation Planning Work Group.

Mississippi recommendations fall within 4 major categories: (1) solutions affecting variations in business practices and policies; (2) solutions affecting state laws or regulations; (3) solutions affecting federal laws or regulations; and (4) solutions affecting interstate HIE. Recommended solutions include the following:


NEW HAMPSHIRE—SUMMARY

The New Hampshire state project team did not include an executive summary.


NEW JERSEY—SUMMARY

The New Jersey final Assessment of Variation and Analysis of Solutions report was submitted by the state project team to RTI International, pursuant to Health Care Research and Quality Contract 290-05-0015.

The objective of this contract is to assess how privacy and security laws and business practices affect the exchange of interoperable health information; to examine how privacy and security policies and business practices regarding electronic health information impact the exchange of said information; to convene and work closely with a wide range of stakeholders in New Jersey; and to develop an implementation plan to address organizational-level business practices and state laws that affect the private and secure interoperable exchange of protected health information (PHI). In New Jersey, the PHI concept is also linked to the New Jersey Information Practices Act, and the scope of information subject to privacy and security protections by certain industry parties may actually be broader than the Health Insurance Portability and Accountability Act (HIPAA) federal use of the term PHI.

Furthermore, all aspects of HIPAA's Administrative Simplification requirements and procedures are part of New Jersey's prompt payment and clean claim laws, which apply to the payment of medical claims. The New Jersey Department of Banking and Insurance is the regulatory authority over these issues. What has emerged in New Jersey is a unitary business model in which questions of privacy, security, the implementation of the transaction and code sets, claims payment practices, coordination of benefits, and many other issues have an impact on the timely payment of clean claims. Hence, all parties—providers, payers, institutions, clearinghouses, third-party billers, third-party administrators, pharmacy benefit managers, and many others—must work together from the inception of the medical encounter to create practices and procedures that work efficiently and do not interfere in the timely payment of clean claims.

The state's final report refines and expands on two interim reports submitted earlier in the project, namely, the Interim Assessment of Variations report and the Interim Assessment of Solutions report. This report presents final project conclusions on the business practices and policies affecting secure exchange of PHI in the state, barriers to such exchange, and proposed solutions developed by the various project work groups.

During the course of the project, the state project team identified and consulted with many different stakeholders representing a variety of providers, payers, government agencies, and consumer groups. For the assessment of both the variations in business practices and the development of solutions to secure health information exchange (HIE), appropriate stakeholders were asked to review and respond to HIE scenarios and domains provided by RTI. In order to solicit responses, individual interviews, group meetings, and conference calls were conducted, each of which was documented and reported by the state project team.

Most of our original conclusions contained in the Interim Variations and Solutions report have remained the same. However, some new health information technology activities have been launched in New Jersey, including the development of a business plan for a regional health information organization (RHIO) and other such efforts. The state's report includes information about these activities. The New Jersey Department of Banking and Insurance and the state project team see this surge in forward momentum as a direct result of the work undertaken in this initiative.

The final findings on variations in privacy and security practices and findings on solutions to identified barriers to secure HIE are as follows:

Section 6.0 of the state report presents and analyzes the state project team's identified solutions. These solutions are presented in 5 categories:

The interoperability solution category includes the technology imperatives and the standards support required for smooth sharing of medical and administrative information. The stakeholders understand that technology may not yet permit enterprise-wide solutions and that not all standards necessary for interoperability are yet in place. Despite these restrictions, the stakeholders have identified the technical functionality necessary for interoperability and necessary to implement electronic systems in the near future, including

New Jersey does not yet have a functional regional health information organization, but there are a number of state and private networks and projects working on sharing medical and administrative data electronically, which are expected to provide a basis for devising statewide solutions.

The New Jersey work-flow solution category highlights a number of changes and adjustments possible in an office work flow during the provision of medical services, changes that will permit smoother interoperability and more complete record keeping.

The New Jersey state team anticipates developing a number of community-based standards and best practices. These will be developed though community forums. Community forums may be held with consumers and stakeholders to discuss work flow and collect information. From these forums a typical work flow will be developed, and a set of consensus best practices and standards may be developed. Unusual work flows will also be outlined for statewide use. The team is hoping that additional funding will be provided by the federal authorities in the form of follow-on Health Information Security and Privacy Collaboration (HISPC) contracts to facilitate these implementation plans.

The New Jersey health care stakeholders need continuing education and update training to understand the federal and state laws and regulations that impact health care within the state. Currently, there is a great deal of confusion, misunderstanding, lack of knowledge, and breadth of interpretation of the health care laws and regulations in New Jersey.

Federal and state law management will consist of several prongs, as follows:

The education solutions are initial and critical foundation blocks to HIE and interoperability in New Jersey. The Solutions Work Group, steering committee, and project management staff agree that an education package should be developed to assist with dispelling cultural and perception barriers. The federal and state HIPAA laws and regulations, as well as policies and procedures developed and approved for New Jersey, should be explained to the consumer and provider stakeholders, as well as to all the other stakeholders, for statewide understanding.

The state team implementation planning process will consider and investigate a number of outreach and communications methods and efforts, including

Any education programs and packages will be available for the stakeholder community for use inside their own institutions and facilities.

All documents and outlines developed to support solutions will be accessible and available to the New Jersey health care community for all to review and download.

The New Jersey state team interim implementation plan considers all the items and ideas presented here.

The state team is currently evaluating the feasibility of proposed solutions. It plans extensive discussions with stakeholders regarding feasibility, since not all affected stakeholders in New Jersey have participated in the HISPC project. In addition, many of the proposed solutions will require extensive effort and expense. More education within the state about the potential benefits of HIE will be necessary to develop a consensus among the many interested parties, and pilot approaches will be necessary to test the feasibility of some solutions. While some entities have developed their own electronic health records, using these records as building blocks for a statewide system will require extensive political buy-in.

Because many different departments and agencies are concerned in the delivery of medical care, handling PHI, and related issues, it is important for all New Jersey governmental agencies to actively and continually communicate with each other on all issues that impact health care issues. All websites should be cross-linked and should be monitored for consistency of information and message.


NEW MEXICO—SUMMARY

New Mexico is a primarily rural state with a large geographic area. It has a total population of about 1.8 million; one large metropolitan area, Albuquerque, with approximately 700,000 people; and a number of small cities and towns, most with populations of less than 50,000. The development of the health information exchange (HIE) network has been under way for two and a half years, led by the New Mexico Health Information Collaborative, a community-based initiative funded by the Agency for Healthcare Research and Quality, community partners, and the New Mexico State Legislature. The Master Person Index, record locator services, data engines, and patient referral services have been in pilot test in Taos, New Mexico, since October 2006. The large health systems in Albuquerque are in the process of implementing electronic health record systems, and there are pockets of EHR system adoption in the small cities and towns, but most practices, especially small ones, continue to be paper based.

The Variations Work Group (VWG) included representation from a diverse set of stakeholder groups. These stakeholders identified 165 privacy and security business practices and concluded that 37 of them posed impediments to electronic HIE. The Legal Work Group reviewed the results from the VWG and made 5 key observations:

New Mexico solutions to HIE barriers fall within the following categories:

  1. variations in organization business practices and policies (Section 6.1)

  2. state laws and regulations (Section 6.2)

  3. federal laws and regulations (Section 6.3)

  4. interstate HIE (Section 6.4)

  5. national-level recommendations (Section 7.0)

Recommended solutions included the following:


NEW YORK—SUMMARY

It has been said that the brick and mortar 20th century health care delivery system will be replaced in the 21st Century with a health information and communications technology infrastructure accessible to all patients and providers.7 Enabled with clinical decision support tools and powered by interoperable technology, this infrastructure offers the opportunity to improve the quality and efficiency of the care delivered while giving consumers better control over their health care experience.

Strong policies that protect the privacy and security of health information are crucial to achieving this transformation. Patients share a great deal of sensitive personal health information with their physicians and caregivers. This information is then shared with insurance companies, pharmacies, researchers, and government for reasons such as treatment, payment, public health, and research. Without adequate privacy protections, individuals take steps to shield themselves from harmful and intrusive uses of their health information, often at significant cost to their health. A consumer-oriented privacy and security framework that ensures that personal health information is used in an appropriate and transparent matter is essential to earning the trust of patients and to the ultimate success of electronic health information exchange (HIE).

Current laws governing HIE and the resulting business practices were developed in the context of a paper world where decisions on what to communicate, how, and to whom are generally made on a one-to-one basis by clinicians. The current laws attempt to serve the patient's privacy interests by restricting what can and cannot be shared and restricting the terms on which sharing takes place. Human judgment and personal relationships play a major role, as clinicians attempt to act as the guardians of their patients' information. However, from the standpoint of the patient's health and wellness, the system falls short. Patients have difficulty accessing their own personal health information and ensuring its availability at the point of care.

Moving from a paper to an electronic health system changes the information-sharing dynamic. An interoperable health information system facilitates a many-to-many relationship, enabling different information technology systems and software applications to exchange data accurately, effectively, and consistently. This change offers new opportunities for patients' access to and control over their health care information, and it facilitates the safety, quality, and efficiency of their care. However, it also demands new approaches for protecting patient privacy and security, including policies addressing the disclosure and use of health care information, and technologies that address patient identification, authentication, record location, identity management, and storage of special classes of information.

The New York state report examines the current laws and business practices related to privacy and security of health information in a paper-based world and begins to explore their implications for the transition to electronic HIE.


NORTH CAROLINA—SUMMARY

Background

In April 2004 President George W. Bush articulated his vision for the future of health care in the United States by an executive order that authorized the secretary of the Department of Health and Human Services, Michael Leavitt, to establish the Office of the National Coordinator for Health Information Technology (ONC), which provides leadership for the development and nationwide implementation of an interoperable health information technology infrastructure to improve the quality and efficiency of health care and the ability of consumers to manage their care and safety.

In October 2005 ONC and the Agency for Healthcare Research and Quality awarded the Privacy and Security Solutions for Interoperable Health Information Exchange contract to RTI International. RTI, in collaboration with the National Governors Association Center for Best Practices, formed the Health Information Security and Privacy Collaboration (HISPC) project and invited the states and territories to submit proposals to participate in the project. The HISPC project was designed to examine privacy and security laws and business practices that affect the ability of every state and territory to exchange electronic health information within its borders and with other states.

The North Carolina Healthcare Information and Communications Alliance (NCHICA) submitted a proposal and in April 2006 was awarded the contract to represent North Carolina. Since the project's commencement, teams of health care stakeholders have worked collaboratively through a process of consensus to identify, assess, and develop plans to address variations in organizational-level business policies and state laws that affect privacy and security practices that may pose challenges to health information exchange (HIE).

Purpose

The purposes of the North Carolina HISPC project are to address variations in organizational-level business policies and state laws that affect privacy and security practices which, in turn, may pose challenges to interoperable HIE; to recommend solutions and implementation plans to reduce or eliminate these challenges; and to increase the level of expertise in and compliance with privacy protections within the health care community.

North Carolina HISPC's goals are to

  1. identify current health care practices and challenges regarding the release and exchange of health information,

  2. develop consensus-based solutions for interoperable electronic HIE that protect the privacy and security of health information, and

  3. recommend high-level plans to implement recommended solutions.

The state project team recommends policy, technological, and legal solutions to the barriers or obstacles identified in the Assessment of Variations report. In addition to identifying solutions, the report also documents, for each potential solution, the HIE context, privacy and security domains affected, involved stakeholders, HIE barriers that are addressed, and each solution's current stage of development.

Work Group Composition

The Variations, Legal, Solutions, and Implementation Work Groups comprise attorneys; practice managers; researchers; clinicians; and professionals in public health policy, health information management, and information security who specialize in health information privacy and security and who represent health care stakeholders such as consumers, health plans, professional organizations, health care facilities, laboratories, health care software vendors, and public health agencies.

The Variations Work Group (VWG) conducted individual and group assessments to document the stakeholders' current practices if they were presented with each of the 18 health care scenarios provided by RTI. The VWG was charged with collecting the business practice data and identifying potential barriers to exchanging health information. The VWG was chaired by Jim Murphy from the North Carolina Department of Health and Human Services (NC DHHS), Office of Medicaid Management Information Systems; Mike Voltero, General Counsel to Blue Cross Blue Shield of North Carolina; and Roy H. Wyman, Jr., a partner at the law firm Maupin Taylor Williams Mullen.

The Legal Work Group (LWG) analyzed the business practices provided by the VWG and identified legal sources of the barriers to exchanging health information. The LWG was chaired by Patricia A. Markus, a partner at the law firm Smith Moore, LLP. The LWG was composed of members representing the following stakeholders: Blue Cross Blue Shield of North Carolina, CareSpark, FirstHealth of the Carolinas, LabCorp, Williams Mullen Maupin Taylor, NC DHHS Department of Medical Assistance, North Carolina Hospital Association, NC Medical Society, Pitt County Memorial Hospital, North Carolina Health Information Management Association, Quintiles Transnational, MISYS, North Carolina Office of Information Technology Services, and UNC Hospitals.

The Solutions and Implementation Plan Work Groups (SWG and IPWG) reviewed the data collected from the VWG and developed solutions and implementation plans to reduce or remove the identified barriers. The SWG and IPWG were chaired by Dave Kirby, president of Kirby Information Management Consulting. The SWG and IPWG were composed of members representing the following health care stakeholders: Blue Cross Blue Shield of North Carolina, Duke University Health System, eHealth Initiative, E-Tech Security Pro, NC DHHS Office of Medicaid Management Information Services, North Carolina Department of Mental Health and Substance Abuse, Novant Health, and Radarfind.

With the exception of the project management office (PMO), all project participants voluntarily contributed their time and expertise to this project.

Methodology

RTI provided the state project team with 18 scenarios to analyze along 9 domains of privacy and security. Each scenario represented a business practice or health care scenario that required the exchange of health information between different entities within North Carolina or between North Carolina and other states. The state project team grouped the 18 scenarios into 4 subgroup work clusters based on the type of stakeholders interviewed, the legal sources for the barriers, the security domains relevant to the scenarios, and the field of expertise of each professional participant.

The scenarios' 4 subgroup work clusters are as follows:

Subgroup 1: Patient Care Scenarios

  1. Patient Care A (Emergency Transfer)

  2. Patient Care B (Substance Abuse)

  3. Patient Care C (Access Security)

  4. Patient Care D (HIV and Genetics)

Subgroup 2: Payer Scenarios

  1. Payment (Electronic Health Record Access)
  1. Pharmacy Benefit A (Mail Order)

  2. Pharmacy Benefit B (Claims Savings)

Subgroup 3: Secondary-Use Scenarios

  1. Regional Health Information Organization (Data Access)

  2. Research (Data Usage)

  3. Law Enforcement (Test Results)
  1. Operations and Marketing A (Rehab Center)

  2. Operations and Marketing B (Birthing PHI)
  1. Employment Information (Return to Work)

Subgroup 4: Government Public Health and Safety Scenarios

  1. Bioterrorism Event (Anthrax Spread)
  1. Public Health A (Active TB Carrier)

  2. Public Health B (Newborn Screening)

  3. Public Health C (Homeless Shelters)

  4. Health Oversight (Legal Compliance)

The PMO developed a facilitator training program to ensure that interviewees were comfortable sharing the policies and practices of their organization during the assessment interviews. The training program elements included confidentiality reassurance, guidance to maintain objectivity, suggestions for how to focus discussions on the presented scenarios and work session questions, and suggestions for recapping information for the recorders. Each VWG session was facilitated and recorded by one or more of the project chairpersons, the project manager, and the project coordinator.

In preparation for the assessment sessions, the chairpersons formulated 7 questions to focus on the "who, what, how, and why" of the organization's business practices regarding the sharing of information that correlated to the assessment-tool fields. The questions each interviewee was asked are as follows:

  1. What is your stakeholder type?

  2. What is your current business practice if presented with this type of scenario?

  3. Why is that your current business practice?

  4. Does this business practice aid the exchange of health information with other entities?

  5. Does this business practice present a barrier to exchanging health information?

  6. Is this barrier appropriate to safeguard the information?

  1. Why is it appropriate?

  2. If not, could you recommend an alternate solution to removing this barrier?

  1. How is this particular business practice affected in a manual or electronic environment?

These 7 questions guided the work groups as they documented the practices shared by the stakeholders, identified barriers and their legal sources, and developed solutions and implementation plans to reduce or eliminate the barriers to exchanging electronic health information.

The following steps were taken to identify the legal drivers of the information-sharing business practices:

  1. The LWG reviewed the scenarios.

  2. The LWG researched North Carolina and federal laws relevant to the type of HIE addressed in the scenario.

  3. Then the LWG was given access to the results of the assessment sessions. The group reviewed the interviewees' current practices and policies.

  4. The LWG identified the gaps between the relevant laws and the current understanding and application of those laws by the various health organizations.

  5. The LWG recommended solutions to the legal barriers presented. The group also advised the SWG on proposed policy solutions that either may pose a liability risk to stakeholders or may conflict with state or federal law.

The SWG chairman, Dave Kirby, developed a work plan that included weekly goals to allow members first to understand the problems and issues and then to formulate candidate solution outlines. These steps were followed by an opportunity to add commentary to the solution outlines that then would be analyzed and commented upon by other project participants. This last element took the form of written subgroup reports. The work plan allowed each subgroup to work simultaneously. This design feature reduced the risk of missing the large project milestones because of a single group's delay. The plan called for the subgroups to vet the various solutions and was structured to allow every viewpoint to be represented in the interim and final reports, together with group views of the applicability of each solution offered. This part of the plan anticipated an environment in which there was sufficient risk to each barrier and sufficient urgency in finding solutions, and it anticipated an environment in which each offered solution would be pressed forward in some venue in North Carolina at least to the point field testing. The project manager correlated and consolidated the various inputs and developed the report.

The HISPC Domains of Privacy and Security

RTI supplied the state project team with a set of domains to consider as the SWG and LWG considered solutions. This set of domains is derived from standard information security principles. Domains 1-6 are relevant to organizations that have implemented electronic health information systems. Because of the limited amount of implemented technology among the interviewees, most of the barriers that were identified centered around Domains 7-9. The 9 domains are as follows:

  1. user and entity authentication to verify that persons or entities seeking access to electronic personal health information are who they claim to be;

  2. information authorization and access controls to allow access only to people or software programs that have been granted access rights to electronic personal health information;

  3. patient and provider identification to match identities across multiple information systems and locate electronic personal health information across enterprises;

  4. information transmission security or exchange protocols (encryption, etc) for information that is being exchanged over an electronic communications network;

  5. information protections so that electronic personal health information cannot be improperly modified;

  6. information audits that record and monitor the activity of health information systems;

  7. administrative or physical security safeguards required to implement a comprehensive security platform for health IT;

  8. state law restrictions about information types and classes, and the solutions by which electronic personal health information can be viewed and exchanged; and

  9. information use and disclosure policies that arise as health care entities share clinical health information electronically.

Summary of Relevant Findings

The VWG and LWG analyzed the responses from the stakeholders and identified policy, legal, and technological barriers that prevented or delayed the exchange of health information.

BR_1. Range within organizations of misinterpretation or misapplication of laws or regulations

Interviewees consistently shared that, unless they were required to share the information, they would rather "protect" it for fear of being held liable for breaching an individual's right to privacy. The VWG, LWG, and SWG found that most of the misinterpretation or misapplication of laws, regulations, or organizational policies stemmed from a lack of awareness that the law, regulation, or policy existed, or from a lack of training that was meaningful to the organization or individual.

BR_2. Lack of business incentives to exchange information

Clinicians who were interviewed feared that engaging in an interoperable HIE such as a RHIO could cause them to lose patients to other providers. They also were interested in the benefits of EHRs but were not sure how such large monetary investments in technology could benefit their patients or their practices. The SWG believed that the lack of health information technology (HIT) adoption and HIE is due to providers' perception that HIT lacks value, to the lack of funding to implement such technology, and to a lack of incentives for sharing information with other entities.

BR_3. Lack of policy standardization across entities

The interviewees and members of the LWG and SWG observed an overall lack of policy standards within their own organizations and industry-wide. Consents and authorizations to treat patients and to release patient information vary from entity to entity. Differing legal and political philosophies cause differing approaches to the application of laws and regulations, resulting in differing information-sharing practices among health care stakeholders.

BR_4. Lack of security standardization across entities

The VWG, LWG, and SWG concurred that the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules laid the foundation for entities to develop privacy and security programs. However, if the goal is to implement an interoperable health information network in order to securely exchange electronic health information, then specific, formal security standards should be identified and adopted by the health care community.

BR_5. Lack of interoperability between processes and technology

The health care system is fragmented. Before technology is implemented, a review of the industry's health care processes should be undertaken to identify where the breakdowns in interoperability occur and whether the appropriate remedies for each breakdown are ones of process or of technology.

BR_6. Lack of workable technology

The adoption of effective HIT is critical to an interoperable nationwide health information network.

BR_7. Conflicting or outdated federal or state laws or regulations

Current privacy laws were appropriately implemented to protect the confidentiality of information. As electronic information exchange increases, however, laws focusing on the confidentiality, protection, and disposal of information contained in paper format should be reviewed and updated to reflect the new medium of exchange.

Consumer Empowerment Barriers

The following barriers were not derived from stakeholder responses. They have been identified by the SWG and LWG in response to the ONC's objectives of ensuring that consumer concerns are identified and represented as the development and implementation of the Nationwide Health Information Network ensues.

BR_8a. Lack of consumer understanding or awareness of the benefits of HIT, which leads to a lack of consumer input into the policy and technology that support health information exchange

To ensure usability, systems designers should engage consumers and seek regular input on how consumers can use HIT and exchange to improve their health.

BR_8b. Lack of definition of consumer empowerment and lack of methodology for including consumers in policy and systems design

Clarifying the term consumer empowerment in relation to the ONC's strategy would assist policy makers and technology experts in developing policy and technology that empowers and improves the lives of consumers. If consumer empowerment includes consumers' ability to manage the access to their health information, then application software would be required to include such features.

Subgroup 1 (Patient Care Direct Treatment Scenarios): Stakeholders

  1. Patient Care A (Emergency Transfer)

  2. Patient Care B (Substance Abuse)

  3. Patient Care C (Access Security)

  4. Patient Care D (HIV and Genetics)

Twenty-nine respondents participated in the assessment sessions for Subgroup 1, the patient care scenarios. The respondents included physician groups, clinicians, hospital health information managers and nursing staff, researchers, hospital privacy officials, and health law attorneys (who responded on behalf of their hospital clients or were familiar with hospital operational issues). The stakeholders reviewed the scenarios and described their organizations' practices with regard to each scenario (for an overview of the barriers identified by the VWG and LWG and the domains addressed, see the tables below).

Number of Stakeholders' Responses Regarding Barriers, by Patient Care Scenario
Barrier Scenario Number
1 2 3 4
BR_1. Misinterpretation of laws   29    
BR_2. Lack of business incentives        
BR_3. Lack of policy        
BR_4. Lack of security   29    
BR_5. Lack of interoperability 29      
BR_6. Lack of technology 29      
BR_7. Conflicting laws   29 29 29

Privacy and Security Domains Addressed, by Patient Care Scenario
Domain Scenario Number
1 2 3 4
1. Authentication X   X  
2. Authorization X X X X
3. Identity Matching X X X X
4. Transmission X X X X
5. Integrity     X  
6. Event Audit     X X
7. Safeguards     X  
8. Data Classification X     X
9. Policies X X X X

Subgroup 2 (Payment Scenarios): Stakeholders

  1. Payment (EHR Access)
  1. Pharmacy Benefit A (Mail Order)

  2. Pharmacy Benefit B (Claims Savings)

Nine individuals responded to Scenario 5. They included staff members from the payer community who specialize in case management, as well as health and corporate law. Respondents to Scenario 7 included HIPAA privacy officials, physician group administrators, health information professionals, clinicians, and research professionals. No pharmacy benefit managers (PBMs) responded to the invitation to participate in the assessment regarding Scenarios 9 and 10. The stakeholders reviewed the scenarios and described their organizations' practices with regard to each scenario (for an overview of the barriers identified by the VWG and LWG and the domains addressed, see the tables below).

Number of Stakeholders' Responses Regarding Barriers, by Payer/PBM Scenario
Barrier Scenario Number
5 9 10
BR_1. Misinterpretation of laws      
BR_2. Lack of business incentives      
BR_3. Lack of policy      
BR_4. Lack of security      
BR_5. Lack of interoperability      
BR_6. Lack of technology 9    
BR_7. Conflicting laws 9    

Privacy and Security Domains Addressed, by Payer/PBM Scenario
Domain Scenario Number
5 7 9 10
1. Authentication X      
2. Authorization X     X
3. Identity Matching X   X  
4. Transmission X   X  
5. Integrity   X   X
6. Event Audit X X    
7. Safeguards        
8. Data Classification   X X  
9. Policies X X X X

Subgroup 3 (Secondary-Use Scenarios): Stakeholders

Subgroup 3 scenarios were based on the uses and disclosures of health information for the purposes of conducting health care operations, marketing, or work-related activities that have no impact on direct patient care. The 27 respondents for Scenario 4 included individuals representing clinicians, hospitals, health plans, public health agencies, laboratories, pharmacies, professional associations, and academic medical centers. The 32 respondents for Scenario 8 included individuals representing clinicians, hospitals, payers, public health agencies, laboratories, pharmacies, law enforcement, professional associations, academic medical centers, county government, and the legal community. The 5 respondents for Scenarios 11 and 12 (Group 3, Health Care Marketing and Operations) included marketing professionals that specialized in hospital wellness programs from the hospital, payer, and disease management communities. The 26 respondents for Scenario 14 (employee health information) included human resources professionals and employees from self-insured employers, payers, academic medical centers, hospitals, and group-practice administrators. The stakeholders reviewed the scenarios and described their organizations' practices with regard to each scenario (for an overview of the barriers identified by the VWG and LWG and the domains addressed, see the tables below).

Subgroup 4 (Government, Public Health, and Safety Scenarios): Stakeholders

  1. Bioterrorism Event (Anthrax Spread)
  1. Public Health A (Active TB Carrier)

  2. Public Health B (Newborn Screening)

  3. Public Health C (Homeless Shelters)

  4. Health Oversight (Legal Compliance)
Number of Stakeholders' Responses Regarding Barriers, by Secondary Use of Health Information Scenario
Barrier Scenario Number
6 7 8 11 12 14
BR_1. Misinterpretation of laws       5 5 26
BR_2. Lack of business incentives   1        
BR_3. Lack of policy 27          
BR_4. Lack of security 27          
BR_5. Lack of interoperability   1        
BR_6. Lack of technology   1       26
BR_7. Conflicting laws 27   32     26

Privacy and Security Domains Addressed, by Secondary Use of Health Information Scenario
Domain Scenario Number
6 7 8 11 12 14
1. Authentication   X   X    
2. Authorization X   X X X X
3. Identity Matching X X     X  
4. Transmission X X   X X X
5. Integrity X X       X
6. Event Audit X     X   X
7. Safeguards X         X
8. Data Classification   X X X X  
9. Policies X X X X X X

Respondents to scenarios 13 and 15-18 (Group 4, Public Health and State Government) included North Carolina state government employees representing public health agencies, substance abuse, mental health, emergency management, laboratories, hospitals, clinicians, medical and public health schools, health information management, and disaster and homeland security professionals. There were no participants from drug treatment centers or homeless shelters. The stakeholders reviewed the scenarios and described their organizations' practices with regard to each scenario (for an overview of the barriers identified by the VWG and LWG and the domains addressed, see the tables below).

Number of Stakeholders' Responses Regarding Barriers, by State Government and Public Health Scenario
Barrier Scenario Number
13 15 16 17 18
BR_1. Misinterpretation of laws          
BR_2. Lack of business incentives          
BR_3. Lack of policy 19        
BR_4. Lack of security          
BR_5. Lack of interoperability 19 11     8
BR_6. Lack of technology   11     8
BR_7. Conflicting laws     12 14  

Number of Stakeholders' Responses Regarding Barriers, by State Government and Public Health Scenario
Domain Scenario Number
13 15 16 17 18
1. Authentication     X   X
2. Authorization X X X X X
3. Identity Matching X X X X X
4. Transmission   X X X X
5. Integrity X X X   X
6. Event Audit X     X X
7. Safeguards         X
8. Data Classification X X X X X
9. Policies X X X X X

Summary of Solutions

The VWG, LWG, and SWG analyzed the barriers to information exchange and proposed solutions to reduce or eliminate barriers that delay or prevent stakeholders from exchanging health information with each other. The solutions are organized by characterizing the scope of the practice of information exchange to which each solution would apply. They are additionally organized according to the organizations that indicate the traits of various solutions related to historical issues of electronic health data exchange.

In the state report, each proposed solution conveys further detail on the barrier that it addresses; the rationale for the particular proposed solution; an alternate solution, if applicable; to whom the proposed solution applies; and potential barriers to implementing the proposed solution. The Implementation Plan report will contain detailed information on the anticipated length of implementation, potential resources for it, and steps for implementing each solution.

The following proposed solutions are not ranked in any particular order of priority:

Conclusions and Next Steps

The HISPC project has convened a core group of North Carolina consumers and health care professionals from varying segments of the health care system. The discussions within the VWG, LWG, SWG, and steering committee, as well as Consumer Advisory Council meetings, have generated interest in further exploring the identified barriers and implementing the proposed solutions. The Implementation Plan report will propose high-level steps for interested stakeholders to consider as they plan for the implementation of the proposed solutions.

The implementation challenge for the North Carolina stakeholders is that there is no executive-level mandate or financial sponsorship to spur implementation of the proposed solutions at this time. Therefore, the next steps for the North Carolina stakeholders will be to

  1. raise awareness about the expected benefits of adopting HIT,

  2. develop programs that foster the growth of HIT thought leadership,

  3. educate and engage the North Carolina General Assembly in the promotion of HIT, and

  4. cultivate the Consumer Advisory Council.

To participate in the continuing efforts or to view more information on the state project team efforts, see the NCHICA site at http://www.nchica.org/NCHISPC/intro.htm.


OHIO—SUMMARY

The purpose of the final Assessment of Variations and Analysis of Solutions report is to provide, for each state, a high-level summary of (1) variations discerned in the analysis, (2) the status of current health information technology (HIT) initiatives, and (3) the most significant interim solutions proposed in their individual reports.

Adoption of HIT is on an upward trend in Ohio. The state created the Third Frontier initiative, a publicly funded effort to promote development and dissemination of cutting-edge information technology across the state. Ohio is also working toward statewide coordination of health information exchange (HIE) through public forums hosted by the Health Policy Institute of Ohio (HPIO) and through developing regional health information organizations across the state, two of which are currently actively engaged in HIE. HPIO has also coordinated the creation of an HIT/HIE Roadmap for Ohio, with input from a broad stakeholder base, and is providing state legislators and the new governor's office with recommendations for moving forward with statewide coordination and monitoring of HIE efforts. Regional projects include the following:

Ohio presented its solutions within 6 major groupings: (1) establishing national standards for HIE; (2) creating a universal patient identifier (or method); (3) standardizing role-based system access models; (4) securing proactive financial support for the adoption of HIT; (5) addressing handling of sensitive health information; and (6) focusing the purpose of adoption of technology on improved quality of care. Recommended solutions included the following:


OKLAHOMA—SUMMARY

Widespread use of electronic health records should provide a means of improving quality of care, lowering health care costs, and preventing medical errors. Improved patient care and additional cost savings can be realized through seamless electronic communication of clinical information between institutions in a private and secure fashion.

The federal government funded a project known as the Health Information Security and Privacy Collaboration in 33 states and a single territory to assess how organizational business policies and practices and state laws regarding privacy and security affect health information exchange (HIE) on a national level.

Oklahoma was selected to participate and was awarded an 11-month contract by RTI International. Oklahoma's information will be combined with other states', with the eventual goal to develop a nationwide electronic health information network. Therefore, this initiative is significantly advancing Oklahoma's understanding of how to use electronic information exchange to transform the health care system without compromising the privacy and security of sensitive medical information.

The Oklahoma state project team was charged with examining business policies and state laws related to privacy and security of HIE. The project offered opportunities for health care professionals throughout Oklahoma to participate in identifying privacy and security practices relating to HIE.

As the first step in the process, the Variation Work Group, comprising a diverse and multidisciplinary group of stakeholders from across the state, identified the organizational-level business practices of HIE as it relates to security and privacy. RTI structured the collection of this data through the use of 18 scenarios and 9 domains of privacy and security. The business practices collected were grouped in primary categories of authentication, contractual agreements, consent for service, data management, release of information, transfer of patient health information, and security. The Legal Work Group met concurrently to determine whether or not a legal driver was one rationale for the business practice.

The research from this project reflects that there is significant variation in business practices across organizations in Oklahoma. Although most business practices supported state and federal privacy and security laws, many entities had business practices in place that were more restrictive than the law required. This conservative approach was deemed to be based on a general lack of understanding or misinterpretation of what personal health information can be released and under what conditions, and of the security requirements for the information.

Other underlying causes were discussed and documented to further enhance the solution and implementation phases of the project, including liability, cost, and standardization. It was determined that the top 7 barriers impeding interoperable health information exchange in the State of Oklahoma were as follows:

The next step in the process ushered in the Solutions Work Group (SWG) and Implementation Planning Work Group (IPWG). The SWG worked hand-in-hand with the IPWG to identify a number of solutions to move the state closer to interoperability. The solutions were vetted, and 3 solutions were considered to have the greatest impact and feasibility for completion within the next 12 to 18 months:

This project has helped lay the groundwork for public and private partnerships as the state begins to move toward electronic HIE. The IPWG is developing implementation plans to support the top 3 state solutions and is addressing how Oklahoma can continue to move toward interoperable HIE.


OREGON—SUMMARY

The electronic exchange of health information holds the potential to revolutionize health care in many ways, including improved quality, cost-efficiencies, enhanced patient-consumer engagement, and greater continuity of care. Within the broad arena of health information exchange (HIE), the Oregon Health Information Security and Privacy Collaboration (HISPC) is exploring the issues of privacy and security. Governor Ted Kulongoski appointed a HISPC steering committee with a breadth of expertise and depth of commitment to accomplish the work of the project. The project is a collaboration of the Oregon Health Care Quality Corporation and the Office for Oregon Health Policy and Research.

Vision

Values

The goal of this effort is to keep Oregonians' health information private and secure. The following values frame Oregon's policy for assuring the privacy and security of electronic health information:

Critical Issues

The health care environment is changing: electronic health records are replacing paper records and health information is increasingly being exchanged electronically. The electronic exchange of information has the potential to revolutionize health care through improved quality, cost-efficiencies, enhanced patient-consumer engagement, and greater continuity of care. While the technology to do so is emerging, there is still a great deal of work to be done to allow for a smooth transition into this new world.

To function in this new environment, trust relationships must be built between individuals and organizations involved in health care or the handling of health information. Multiple high-profile inappropriate disclosures have heightened consumer concern for the privacy and security of their electronic health information. The need to protect individuals' privacy must be balanced with the need to share individuals' health information so that care is safe, effective, and efficient. Achievement of this balance between potentially conflicting values necessitates an approach that includes an enhanced role for the individual in determining the flow of his or her health information.

Recommended Solutions

Consumer protection. Adopt the Markle Foundation's Connecting for Health principles regarding the individual and his or her health information as guiding principles for consumer protection:

Provider identification. A coordinated approach to identifying, authenticating, and authorizing providers should exist.

Patient identification. A coordinated approach to identifying, authenticating, and authorizing patients should exist.

Public engagement. An educated and engaged Oregon population regarding health information privacy rights and expectations should emerge.

Specially protected information. An examination should be undertaken of state laws that define specially protected health information to determine the appropriateness of the protections and the feasibility of implementing these protections in an electronic environment.

Medical identity theft. An examination should be made of state laws regarding identity theft to determine if medical identity theft is appropriately and adequately addressed.

Technical assistance. Support should be offered to organizations for comprehensive adoption of appropriate privacy and security practices for the Health Insurance Portability and Accountability Act (HIPAA) and other federal and state law compliance.

Noncovered entities. Legal privacy and security requirements not covered by HIPAA should emerge for entities handling personal health information.

Secondary use. An examination should be undertaken of current practices for secondary use of data, in order to determine an acceptable balance between ensuring that personal health information is protected, and making de-identified data available for appropriate use.

Enforcement. Legislative or regulatory measures should emerge to address inappropriate disclosures and mitigate potential harmful effects of personal health information disclosure.

State leadership. In order to ensure that evolving electronic health information systems adequately protect the privacy and security of individuals, Oregon's state leadership must coordinate the identified solutions.


PUERTO RICO—SUMMARY

The Puerto Rico Health Department (PRHD) is committed to the development and implementation of health information systems that facilitate health information exchange. It was awarded a grant by RTI International to participate in the Health Information Security and Privacy Collaboration (HISPC) project. Its participation in this project allows the PRHD to develop a descriptive analysis of the public and private business practices, policies, and state laws affecting electronic health information exchange, and to then propose feasible solutions and implementation plans that promote and allow for interoperability in health information exchange, in accordance with relevant security and privacy regulations within the territory.

The descriptive analysis of variations and review of proposed solutions toward interoperability, at the center of the current stage of the HISPC project, are significant because they make it possible to juxtapose the description and evaluation of existing practices, policies, and laws with the proposed solutions to barriers that unnecessarily impede information exchange. The dual focus of the report will serve as a resource in future efforts to promote interoperability, ensure security, and protect the privacy of patients and consumers in Puerto Rico. It can also assist in the development of corrective measures that will help bring local practices, policies, and laws in line with federal and international initiatives.

Puerto Rico's HISPC project is managed by a local project management team (PMT), which is composed of the director of HIPAA and External Affairs, a member of the Legal Advisor's Office of the PRHD, and two consulting teams. The HIPSC steering committee acts as the decision-making body for the course of this project. It is tasked with overseeing and finalizing deliverable reports. These reports will serve as the basis for identifying and taking steps toward the realization of increased and more efficient health information interoperability.

In order to understand the dynamics of health information exchange on the island, the HIPSC project's steering committee and the PMT convened a Variations Work Group (VWG) and Legal Work Group (LWG). These groups have been composed primarily of health care professionals and health care providers from both the public and private sectors. The VWG met regularly to identify variation within business practices and to document institutional policies that characterize the exchange of protected health information in Puerto Rico. It identified practices and policies that address the privacy and security of personal health information exchange for 18 different scenarios that RTI provided to the PMT. In addition, the PMT determined whether each business practice that it identified in discussions with stakeholders is best classified as barrier, as aid, or as neutral with respect to interoperability. The LWG was tasked with the identification of legal drivers, underlying laws, regulations, court cases, and legal barriers to interoperability.

The information about business practices provided and assessed in the Puerto Rico report was gathered through 3 different methods: in discussions that took place in meetings of the VWG, from a survey distributed to health care providers, and through interviews held with particular stakeholders. The PMT collected information from these 3 sources and compiled it in a Microsoft Excel spreadsheet.

The report, the final assessment report for the security and privacy project, describes variation in institutional and business practices, policies, and laws and provides critical observations on the 18 scenarios provided. It does so by discussing the following 9 domains:


RHODE ISLAND—SUMMARY

Overview

Deliverable 5, Final Assessment of Variation in Organizational-Level Business Practices and Analysis of Privacy and Security Solutions, was prepared by the Rhode Island Department of Health and its stakeholder participants in the Rhode Island Health Information Security and Privacy Collaboration (HISPC) in preparation for satisfaction of a contractual requirement to RTI International. The purpose of the document was to present the final findings from a statewide process of documenting and assessing variations in current health information exchange (HIE) practices, policies, and laws and to present a final account of proposed solutions derived from this assessment. These solutions are intended to advance strong privacy and security protections to enable interoperable electronic HIE in Rhode Island. Using the final Assessment and Analysis of Solutions, this report has also established the basis for the final Implementation Plan report to be submitted at the conclusion of the HISPC project.

Rhode Island has leveraged the governance and committee structure of its ongoing HIE network initiative for the HISPC project. Leadership, managers, staff, and committees served as the core state project team to develop and refine HISPC work products. The Assessment of Variation included 27 health services and government agency stakeholder groups in an analysis of their respective HIE practices as applicable to a set of RTI-defined scenarios. This process included the transcription of stakeholder meeting details and the subsequent development of concise statements describing relevant HIE, or business practices. Each practice has been correlated to a primary privacy and security domain—there are 9 domains that are of particular interest to RTI. Privacy and security domains found to be of significance in the assessment of variation have served as important factors in the analysis of solutions presented in this report.

The report is divided into 5 major sections:

  1. Background and Purpose

  2. Assessment of Variation

  3. Analysis of Solutions

  4. Conclusions and Next Steps

  5. Appendices

Descriptive details on all notable business practices referenced in this report, including both those classified as barriers to HIE and those deemed "effective" practices, are listed in Appendix A of the report. All final business practice details have been rendered anonymous (except with regard to state government agencies), documented, and maintained in the RTI online assessment tool. The entire set of business practices is available to stakeholders on request from the HISPC project manager.

Final Assessment of Variation

A specific process was used to identify and document 153 distinct HIE practices for participating organizations across the state. These business practices have been validated by the participating stakeholders to ensure that they are complete and accurate. A professional legal review and analysis of applicable state and federal laws has been used as a benchmark for practice classification. Practices have been classified as "barriers" or "neutral" to HIE, depending on the policies and laws that drive them. Policies and practices supportive of privacy protections that were stricter than prevailing laws were not considered barriers unless they placed an undue constraint on permissible exchanges of information. The classification criteria and other details of the assessment are included in Section 2.

It is notable that most practices (73%) documented through the assessment process are related to HIE for treatment and payment purposes. Thirty-two of 153 HIE practices (21%) were identified as barriers to HIE, and 91% of these barriers occur in the treatment and payment purposes category. It is also important to note that, as a percentage of the total number of barriers grouped by domain, the greatest proportion of barriers (53%) occur in the "Information Use and Disclosure Policies" domain. This percentage is followed by 16% of the total number of barriers in each of two other key domains: "Information Authorization and Access Controls" and "State Law Restrictions About Information Types and Classes." These findings confirm the need for improvements in these domains and are consistent with current efforts by Rhode Island stakeholders to use patient-driven authorization practices to improve privacy protections in the emerging Rhode Island HIE.

Critical observations, issues, and implications for solutions that arose from the assessment of variation can be summarized as follows:

  1. Variations in practices to obtain patient authorization for the release of information span the full range of drivers, including state and federal laws, organizational policies, and distinct business practices. Above all other issues, authorization practices and their integral relationship to health information use and disclosure is the major area of focus for improving privacy and security protections in the exchange of health information in Rhode Island. While special classes of information may require different authorization practices under the law, and these practices may present some degree of constraint on HIE, the variability in authorization practices for "general" health information points to a broader set of issues that reflect fundamental differences in consumer, provider, and organizational views on patient privacy protections.

  2. Restrictive policies prohibiting consulting physicians access to hospital-based electronic health records (EHRs) tend to have technical origins that increase the risk of unauthorized or incidental disclosure. Solutions should be pursued, including appropriate identification policies, authentication mechanisms, and education and training to promote physician adoption and use of a range of electronic health information systems, including the statewide HIE network.

  3. In general, in cases in which outside entities, such as health plans, are given access to an organization's EHR for legitimate utilization review or payment authorization purposes, solutions should focus on consistent implementation of clear and reasonable disclosure parameters, auditing policies, and the assurance of auditable access control technology for health plan and other EHR users. The need for strong access control and audit policies will be especially important to establish consumer trust in an HIE network.

  4. Upholding strong human subjects review and institutional review board procedures will be essential to preserve and protect health information for research purposes. As the Rhode Island community contemplates permitted uses of health information accessed through the Rhode Island HIE, it is clear that an important area of focus will be to ensure privacy and confidentiality protections and strong governance and oversight of data use decisions, such as research.

  5. Secure interorganizational clinical communication methods and networks appear to be a high-value application to support patient-provider communication and treatment and payment practices; however, these methods and technologies are not widely deployed.

  6. Current Rhode Island law provides for the use of digital signatures or other electronic authorization methods in place of written signatures; however, this capability is not used in routine practice. Solutions to enable broad use of digital signatures must be embraced to enable the proliferation of electronic HIE independent of paper-based documentation methods.

  7. In the interest of promoting consistent, readily understandable policies and procedures for the protection of special classes of information, a legal solution will be required to put sexually transmitted disease information on par with other protected classes of information, such as substance abuse, mental health, HIV/AIDS, and genetic testing.

  8. As Rhode Island proceeds with the development and implementation of a statewide HIE system, several legal issues must be resolved to enable a high-value, highly used system to evolve.

  9. Federal Family Educational Rights and Privacy Act (FERPA) regulations pose strict consent requirements on exchanges of school health information and can have a significant impact on public health programs, especially child health, welfare, vaccine-preventable disease prevention, and communicable diseases.

  10. Solutions to HIE barriers must take into account the incremental adoption of electronic health information systems.

Final Analysis of Solutions

The final solutions described in Rhode Island's report include a priority set of fundamental building blocks intended to enable interoperable electronic HIE. The HISPC steering committee provided insightful direction as to the prioritization of approaches to implementing responsible privacy and security protections. This guidance included positioning all solutions relative to essential areas of capability development required to accomplish private, secure HIE through the Rhode Island HIE network. The resultant solution set addresses policies, methods, and standards in 4 areas: (1) protecting data confidentiality and integrity, including authorization and access controls; (2) ensuring reliable authentication of network users and patients; (3) matching and merging patient records in the Rhode Island HIE; and (4) auditing capability for monitoring access to the network.

Section 3 provides a detailed account of the process for solution identification, development, prioritization, and determination of feasibility. In addition, detailed profiles are included for the 4 final solutions that have been advanced to the implementation planning stage. While Rhode Island's strategy is to first develop statewide HIE capacity, this report describes preliminary planning discussions between Rhode Island and Connecticut regarding the potential for interstate HIEs involving each state's HIE network. These discussions are initially focused around 3 areas:

Rhode Island offers the following national-level recommendations as preliminary ideas derived from the work to date:

  1. The US Department of Health and Human Services, Office of the National Coordinator (ONC), should strongly consider the recommendations advanced through the January 23, 2007, report issued by the Foundation of Research and Education of the American Health Information Management Association, Development of State Level Health Information Exchange Initiatives Final Report: Extension Tasks, with special attention to Task #1: Relationship of State-Level HIE to Federal/Other HIT Activities. On the basis of the findings of this study, ONC and the US Department of Health and Human Services should implement a series of strategic and tactical actions that maintain coordination and open communication among state and federal HIE initiatives.

  2. There should be review and clarification of specific laws and regulatory guidance in the context of emerging state and regional HIE organizations. Key areas of focus should include (1) clarification of 42 U.S.C. § 290dd-2 regarding the breadth of applicability of federal funding status on the release of alcohol and substance abuse treatment records; (2) review of Clinical Laboratory Improvement Amendments regulations in light of HIE organizations that endeavor to provide electronic laboratory reporting services; and (3) review of FERPA, 34 C.F.R. pt. 99, restrictions on the authorized release of school health records, in light of HIE organizations that endeavor to support public health planning and disease surveillance activities.

Conclusion

The report describes how the HISPC privacy and security initiative has contributed to advancement of the work required to ensure that the Rhode Island HIE network demonstrates responsible privacy and security protections for the electronic exchange of health information. As for next steps, Rhode Island will continue in an active state of development and implementation of its statewide network after the HISPC project ends:


UTAH—SUMMARY

Beginning in July of 2006, the Utah Network for Electronic Public Health Information, Privacy and Security, project began collecting data from Utah's health care community regarding health information exchange (HIE) business practices, policies, and state laws. The state's report is the third in a series that documents the efforts of the project work groups to identify constraints on appropriate exchanges of health information, privacy or security risks, and solutions that balance privacy and security and facilitate appropriate exchanges of health information while ensuring patient rights.

Utah's health care industry is in transition from a paper to an electronic environment and requires policies supportive of a phased migration. The findings refine and expand on the two previous interim reports, Assessment of Variations and Interim Solutions, which were offered by the Variations Work Group (VWG) and Solutions Work Group. The report consists of 6 major sections:

  1. Background and Purpose

  2. Assessment of Variation

  3. Summary of Key Findings from Assessment of Variations

  4. Review of State Solution Identification and Selection Process

  5. Analysis of State Proposed Solutions

  6. National-Level Recommendations

The data for this report was collected from a volunteer nonrandom sample of Utah health care stakeholders that were determined to have knowledge or engage in business practices relevant to each scenario. Care was taken to include diverse representatives from (urban and rural areas; different-sized organizations; profit, nonprofit, and independent organizations) Utah to provide a comprehensive report of interoperability privacy and security.

The VWG met to determine which of the 154 business practices collected served as a barrier, without judgment, to HIE within the state. From these meetings, 3 key findings emerged:

  1. Health care providers obtained patient authorization to disclose health information for all situations except emergency situations.

  2. Variations existed regarding the methods used to transmit protected health information (PHI), with fax transmission being the most common. Variation further existed with regard to beliefs about, and understanding of transmission security.

  3. Rules and statutes varied with regard to PHI, and, as a result, entities implemented business practices according to a variety of legislative guidelines. These guidelines primarily included either the Health Insurance Portability and Accountability Act or 42 C.F.R. pt. 2.

The Legal Work Group determined that a few business practices were driven by state statute. Utah privacy or tort law was cited more often as a constraint, in that organizational practices were defensive measures put in place to protect against tort litigation.

E-Health in Utah is quickly becoming accepted as a means to improve health care, lower costs, and promote healthier communities. It is clear that continuing to move e-Health forward requires development of infrastructure capacity to support interoperability. Utah's history of public-private partnership demonstrates a commitment to open-market solutions. While the proposed solutions represent only one network, a strategic planning effort must include all players in the health care industry, as well as vendors and other entities that bring vital resources to the table. An open dialogue is required to gain common understanding if participants are to succeed in communicating with other agencies and organizations while maintaining privacy and security.

The solutions presented in the report are intended to preserve essential privacy and security protections, establishing a foundation for consumer trust with a patient's bill of rights, and moving forward electronic connectivity to permit appropriate exchange of health information.


VERMONT—SUMMARY

The Vermont state project team did not include an executive summary.


WASHINGTON—SUMMARY

As part of the US Department of Health and Human Services's health information technology plan for creating a nationwide health information network, 34 state/territory-level Health Information Security and Privacy Collaboration (HISPC) projects completed 10 months of work in April 2007 to address privacy and security issues affecting interoperable electronic health information exchange (HIE). In April 2006, Governor Christine Gregoire's office designated Qualis Health, a not-for-profit health care quality improvement organization based in Seattle, to lead the HISPC project in Washington State.

In June 2006, Qualis Health entered into contract with RTI International to facilitate diverse groups of volunteer experts in HIE to participate in a series of work groups tasked to

The state's final report embodies the collective expertise and opinions of more than 100 Washington State volunteer experts in HIE and related privacy and security issues, representing more than organizations and interest groups. As part of RTI's prescriptive HISPC process, work groups identified over 360 business practices and policies related to current practice for HIE between entities. The majority of business practices collected during that process related to information use and disclosure policies, information authorization and access controls, and information transmission security or exchange protocols.8

A group of 12 volunteer experts, called the Variations Work Group, assessed these business practices and labeled them as either a barrier9 to electronic HIE, an aid to it, or neutral toward it. These findings served as the starting place for the Solutions Work Group, whose task was to draft solutions to remove unnecessary barriers to electronic HIE. The Solutions Work Group participants recognized early on that the lack of generally accepted minimum privacy and security standards related to electronic HIE was a major barrier to widespread adoption of effective business practices that promote increased interoperability. They developed a process-based set of 3 solutions with the goal to protect privacy and security of health information while reducing or eliminating unnecessary or inappropriate privacy and security obstacles to electronic HIE:

  1. Develop a minimum set of operational and technical requirements, together with related policies and procedures, that participants in HIE need to have in place to achieve secure transmission of personal health data and protect patient privacy. This "Privacy and Security Core Solution Set" addresses 4 domains:

  1. Work with public and private stakeholders throughout Washington State to develop and implement provider and consumer incentives to adopt the Privacy and Security Core Solution Set.

  2. Establish an administrative body to develop, administer, and promote use of the Privacy and Security Core Solution Set. The administrative body will focus on the following major activities:

The Implementation Planning Work Group expanded upon this work by documenting practical approaches and actionable steps for implementing the recommended process-based solutions. The implementation plan as outlined in the report focuses on establishing an administrative body that carries with it the authority to develop and promote the Privacy and Security Core Solution Set. The implementation plan does not advocate a specific governing structure, but instead describes optional structures that could be employed. Options include models such as the Health Insurance Portability and Accountability Act standards process and the electronic health records certification process currently used by the Office of the National Coordinator of Health Information Technology. The concept is to establish an administrative body that develops and recommends privacy and security policies, procedures, and standards to a governmentally authorized entity that, in turn, adopts them by regulation or other official action. As stakeholders invest in electronic HIE systems, they would have incentives to comply with the privacy and security standards, such as the assurance that their risk and liability will be moderated through some form of "safe harbors" treatment, or other types of incentive.

The ideal implementation plan would call for establishing the administrative body first, with development of the standards and incentives under its umbrella. However, implementation in the State of Washington must adapt to the political and practical realities of the state HIE environment. The Washington Health Information Infrastructure Advisory Board (HIIAB), an authoritative body convened by law in 2005, delivered a report and recommendations for a state health information infrastructure to the legislature in December 2006. Legislative action on the HIIAB recommendations is expected in the near future, and the next phase is expected to commence summer 2007. The HISPC recommendations generally complement and support implementation of the HIIAB recommendations, and HIIAB implementation in turn may provide support for or facilitate adoption of the HISPC recommendations. One of the recommendations of the HIIAB is the formation of a nongovernmental, nonprofit entity to play a key role in Washington State health information infrastructure development. If this recommendation is followed, such an entity might logically be the sponsoring entity for the administrative body described in this report.

Establishing the specific details of the structure and sponsorship of the HISPC's administrative body is problematic at this time because it depends upon resolution of the HIIAB's implementation and the legislature's funding priorities. Therefore, a key recommendation in this report is implementation of a HISPC "bridge" strategy. This bridge strategy will include the establishment of a "light" administrative structure to provide for communications, meetings, and the like, and one or two work groups to continue development of solutions and so maintain momentum and trust in the process. If and when the HIIAB's recommendations are implemented, it will then be feasible to pursue a more formal linked arrangement between HIIAB and HISPC. If the HIIAB recommendations are not implemented or discussions make it clear that a linked arrangement is not feasible, then the longer-term strategy is to establish the HISPC administrative body independently or through another existing sponsor.

The momentum and interest generated by the HISPC in Washington State has been considerable. The potential to improve the quality of patient care in a more cost-effective manner through widespread use of electronic HIE, and the state government's leadership role in promoting the adoption of health information technologies, make the privacy and security solutions and implementation plans described within this report timely, relevant, and achievable.


WEST VIRGINIA—SUMMARY

Project Background

In May 2006, the West Virginia Medical Institute was awarded a contract by RTI International to participate in the National Health Information Security and Privacy Collaboration project. This project is part of a national effort of the US Department of Health and Human Services's Office of the National Coordinator for Health Information Technology, the Agency for Healthcare Research and Quality, and the National Governors Association. West Virginia is one of 34 states and US territories to receive a contract for this work. The goal of this project is to assess variations in business practices related to the private and secure exchange of health information among various stakeholders, analyze the legal basis for these practices, propose solutions for barriers found to interfere with health information exchange and develop plans to implement the proposed solutions. This work has been accomplished by 4 groups focusing on each of these goals: the Variations Work Group (VWG); the Legal Work Group (LWG); the Implementation Plan Work Group (IPWG); and the Solutions Work Group (SWG).

Methodology

To begin, the state project team invited individuals representing 17 stakeholder groups to join the VWG. Through a series of meetings, teleconferences, and focus groups, the VWG analyzed a collection of 18 scenarios addressing the use and disclosure of health information. The work group members described business practices and policies that would be followed by their respective organizations in responding to each scenario. These business practices encompassed 9 domains of security and privacy, including whether or not a given domain would be considered a barrier to interoperability. These business practices were collected with use of an assessment tool provided by RTI.

The LWG identified applicable privacy and security laws, regulations, court cases, and other legal sources governing the exchange of health information. Then they analyzed each business practice for legal barriers and mapped those barriers to applicable federal and state legal drivers. This information was added to the assessment tool. The completed assessment tool was distributed to a wider group of stakeholders for additional comment, and the data was then uploaded to the RTI project portal.

The SWG and IPWG elected to merge their groups and treat the solution search and implementation planning as a single process. The chairpersons believed that discussions generating solutions would lead immediately to proposed implementation plans as they attempted to prioritize solutions and that it would be more efficient and productive to permit such discussions to reach their integral conclusions. These groups worked together to arrive at a set of actionable tasks designed to address each of the key solutions identified in West Virginia's Interim Solutions report. The IPWG tested the reality of many of the recommendations contained in this report by soliciting public, provider, and consumer response through a series of public meetings that were convened around the state. Comments and recommendations acquired through these exchanges assisted the IPWG in framing many of its final recommendations.

The implementation plan presents a practical and detailed framework including activities that will lead to the fulfillment of the project's short- and long-term objectives. The plan identifies the stakeholders that will be tasked with implementation responsibilities necessary to ensure that West Virginia is able to sustain an ongoing process leading toward the successful, safe, and secure exchange of health information electronically.

Summary of Critical Observations

Key issues and findings of the work groups include the following:

Barriers to health information exchange generally fall into 3 broad categories: inconsistent state and federal laws, misunderstanding or misinterpretation of policies or laws, and the inconsistent application of the policy or law in actual practice. The state project team believes that each of these barriers can be addressed through the development of creative legislative, regulatory, technical, administrative, and educational solutions.


WISCONSIN—SUMMARY

In November 2005, by Exec. Order No. 129, Governor Doyle created the eHealth Care Quality and Patient Safety Board (eHealth Board). The goal of the eHealth Board is to have 100% adoption of electronic health records systems and the appropriate exchange of health information from these systems within 5 years. The eHealth Board was charged with developing a roadmap for achieving this goal.

The eHealth Board submitted the Wisconsin eHealth Action Plan to the governor in December 2006. This plan addresses the following challenges:

A key concern identified in the eHealth Action Plan is the requirement to exchange health information electronically in a way that is secure and protects a patient's privacy. In March 2006, the Department of Health and Family Services applied for the Health Information Security and Privacy Collaboration (HISPC) contract on behalf of the eHealth Board; the resulting effort is referred to as the Wisconsin Security and Privacy Project. Wisconsin was one of 34 states and territories awarded a contract to assess the security and privacy issues related to eHealth.

The Wisconsin Security and Privacy Project began in the fall of 2006 with the formation of 4 work groups: Variations, Legal, Solutions, and Implementation. In the development of the 4 work groups required by this project, Wisconsin was fortunate to have 52 individuals who volunteered their time and represented advocates, clinics, consumers, corrections, health care organizations, health care providers, health care quality organizations, hospitals, industry, laboratories, pharmacies, professional associations, public health, schools, payers, and state government.

Assessment of Variation

As required by the HISPC contract, the first group convened in this process was the Variations Work Group. The Variations Work Group was charged with reviewing 18 scenarios developed by RTI International to identify current business practices related to health information exchange (HIE), as well as the driver for each business practice. The work group discussed variations in business practices between the responding stakeholders, as well as which business practices posed barriers to HIE. For business practices considered barriers to exchange, the work group discussed which barriers should remain as a privacy protection and which could be reduced or eliminated without removing necessary privacy protections. Staff assisted in the review of the business practices and the determination of which practices related to the domains in information exchange as identified by RTI.

The Legal Work Group was convened shortly after the Variations Work Group to identify the legal drivers of the business practices identified by the Variations Work Group, and it evaluated potential legal barriers to HIE. The Legal Work Group reviewed the 18 scenarios and identified and cited the legal drivers for business practices, as well as all legal barriers associated with the scenarios.

A summary of the barriers documented and analyzed by the Variations and Legal Work Groups follows.

Barriers Driven by Wisconsin Law

Wisconsin statutory requirements that relate to HIE and are more restrictive than federal requirements cause barriers to the exchange of information.

Some of the greatest statutory barriers to HIE are the regulations associated with the treatment of sensitive information, defined as information pertaining to mental health, alcohol and other drug abuse, and developmental disability. The requirements include

HIV test results are also treated as sensitive information (Wis. Stat. § 252.15), except that they can be disclosed from provider to provider for treatment purposes.

Other barriers driven by Wisconsin law include the following:

Barriers Driven by State and Federal Law

Whenever state and federal law do not mirror one another, several barriers to the exchange of information are created. First, one must determine which law controls (state or federal); then, once the controlling law is determined, one must understand the requirements of the controlling law. This makes interstate exchange of information increasingly difficult because other state laws must be understood in order to exchange.

Consent requirements, governed by state and federal law, present the greatest hurdles to HIE. The barriers are caused by

Although eliminating these consent requirements would reduce the barriers to exchange, federal law 42 C.F.R. pt. 2 requires patient consent to exchange alcohol and other drug abuse information for treatment purposes, unless revision of that federal law occurs.

Other areas where state and federal law differ include

Barriers Driven by Federal Law

In some cases, federal law is more stringent than state law. In all of these cases, both the law and the varying interpretations of the law cause barriers to exchange. The federal requirements identified by the work groups and that pose barriers to exchange include the following:

Barriers Driven by Policies and Practices

The Variations and Legal Work Groups identified several barriers to HIE that are driven by organizational-level business policies and practices. Most often, variations in policy and practice implementation create barriers to HIE.

Barriers driven by policies and practices include the following:

The final barrier identified by the work groups is technology. In general, current technology used in Wisconsin cannot limit access to relevant parts of the record or to specific records to comply with minimum necessary requirements. Furthermore, currently employed technology often cannot specify the type of access (read-only, edit/modify, delete) granted to the user. For those who do not have electronic medical records, the lack of technology creates a barrier to exchange. This issue will not be an easy barrier to overcome, because technology systems are extremely expensive and many providers cannot afford the cost of technology. In addition, the costs related to the implementation of technology were also deemed a significant barrier to exchange.

Assessment of Solutions

Solutions Work Group

The Solutions Work Group was charged with the analysis of identified barriers, balancing privacy protections against the need to know, and developing solutions to improve the exchange of health information. The Solutions Work Group included a mix of members from the previous work groups, as well as new members who increased representation in advocacy and policy making, for a total of 35 members. Members represented clinics, hospitals, consumer organizations, law enforcement, health care quality organizations, industries, pharmacies, professional associations, providers, public health, research, state government, health information vendors, and payers.

The Solutions Work Group reviewed health information barriers caused by variations in organizational-level business practices and relevant state and federal laws as identified by the Legal and Variations Work Groups. The Solutions Work Group followed a complex, creative approach that included a series of small breakout groups and large group discussions to allow active participation from all members, the capture of varied viewpoints, and ultimately the creation of solutions that will improve HIE without compromising necessary patient privacy protections. Through this process, each barrier was analyzed to determine whether it should remain or be reduced or eliminated. Solutions were developed to reduce or eliminate barriers that the group decided should not remain, and they were finally grouped into broader solutions with a greater feasibility of implementation.

Summary

An overview of the proposed solutions is provided below.

Verification of Patient

Currently, health care providers do not use a uniform method to capture standardized criteria to identify a patient (patient identifiers). 10 , 11 Moreover, there is not a standard method to verify patient identifiers at the time of exchange. 12  This lack of standardization creates significant risks to accurate and timely patient care. Variation in practice also poses a number of challenges to exchanging information in a paper or electronic format. Moving into an electronic world where information is exchanged between electronic health care systems will require standardized collection of patient identifiers, verification of patient identifiers, and accurate matching of identifiers to patient information. Currently, national efforts are under way to develop a set of unique patient identifiers to alleviate these issues.

The solution proposed by the Solutions Work Group addresses current issues with misidentification of patients while positioning Wisconsin to incorporate the national recommendations once they are completed.

The Solutions Work Group proposed the development of a standard set of identifiers, as well as a set of model policies and procedures to ensure appropriate capture and verification of those identifiers. The state project team would maintain an understanding of national efforts to develop a national set of identifiers and would develop policies and procedures that accommodate the national recommendations. This way, Wisconsin's model policies and procedures can be easily revised to incorporate national standards once they are established.

Modification of Wisconsin Statutes Chapter 146 to Mirror HIPAA in Specific Areas

Many of the barriers to HIE result from strict privacy protection requirements in the Wisconsin privacy laws. While some of the restrictions clearly interfere with or prohibit information exchange, others are so complex in their application that they result in wide variation in practices relating to disclosures. Additional barriers are created because the Health Insurance Portability and Accountability Act (HIPAA) creates privacy protections in many of the same areas as Wis. Stat. §§ 146.81-146.84; therefore, application of these laws is complicated because it is difficult to determine which law applies.

Based on a review of the barriers to HIE created by the Wisconsin Statutes Chapter 146, the Solutions Work Group proposed revising these statutes to mirror the language in HIPAA in the following areas:

  1. expanding disclosures to family (Wis. Stat. §§ 146.82, 146.83)

  2. expanding disclosures to law enforcement

  3. modifying redisclosure restrictions (Wis. Stat. § 146.82(2)(b))

  4. modifying the requirements for documentation of disclosure (Wis. Stat. §§ 146.82(2)(d), 146.83(3))

The Solutions Work Group determined that these additional restrictions did not significantly improve patient privacy; instead they added to the complexity of HIE, which can result in individuals' not having the information required to diagnose, treat, or care for patients.

Modification of Wis. Stat. § 51.30 to Allow the Exchange of Health Information for Treatment Purposes

Wis. Stat. § 51.30 provides additional protections for health data that contains information related to mental health, developmental disabilities, and alcohol and other drug abuse. These additional protections create barriers to the exchange of information, some of which are arguably necessary privacy protections, while others, it can be argued, deter the exchange of information that could lead to better care. Additional barriers are created because Wis. Stat. § 51.30 is more restrictive than HIPAA regarding the exchange of information protected by this law.

The Solutions Work Group reviewed barriers associated with these restrictions and determined that Wis. Stat. § 51.30 should comport with HIPAA and be revised to allow exchange of information between providers, without patient consent, for treatment purposes. While this change would allow the exchange of information protected by this law, it would not affect the provider's inability to disclose treatment information without patient consent as protected by 42 C.F.R. pt. 2, the federal statute protecting such information. Consent would still be required to exchange this information.

It should be noted that the majority of the members of the Implementation Work Group further refined the solution and determined that the law should be revised to allow the exchange of information for treatment purposes, but the group did not determine what information should be exchanged freely without consent.

Changes to HIPAA

The Solutions Work Group reviewed all of the barriers associated with the HIPAA Privacy Rule that were identified through the Variations and Legal Work Groups' review of the 18 scenarios. Following discussions of the barriers, the Solutions Work Group proposed the following 3 changes to HIPAA:

This proposed solution was not reviewed by the Implementation Work Group, because it was determined that a plan to implement changes to federal law would most efficiently and effectively be created by individuals experienced with national legislative change.

Next Steps

The eHealth Board extends its sincere appreciation to all of the volunteers who dedicated their time to the Security and Privacy Project. The information that has been collected through this process will be valuable as the eHealth Board begins the implementation phase in developing electronic systems and a means to exchange health information electronically.

The recommendations contained in the report represent possible solutions to the challenges identified through the analysis of the 18 scenarios. The recommendations are intended to inform policy discussions but should not be construed as the comprehensive or definitive legislative recommendations of the eHealth Board at this time. The eHealth Board will be using the Security and Privacy Project reports to assess where the proposed solutions fit within the eHealth Board's scope of work for the coming years. Wisconsin is committed to developing the necessary policies and procedures to ensure the adoption of health information technology and exchange throughout Wisconsin in an effort to ensure quality of care and patient safety.


WYOMING—SUMMARY

Wyoming is one of 34 states and territories awarded a subcontract with the US Department of Health and Human Services, Agency for Healthcare Research and Quality, through RTI International, to address privacy and security policy questions affecting the interoperable exchange of electronic health information among the numerous organizations that make up the health care community. The Health Information Security and Privacy Collaboration (HISPC) project is designed to identify variations in privacy and security practices and laws affecting electronic information exchange; develop best practices and propose solutions to address identified challenges; and increase expertise about health information privacy and security protection in communities. The Wyoming HISPC project will also produce an implementation plan for the solutions identified in the analysis.

The state report represents the final assessment of variations in Wyoming's organizational-level business policies and practices, and identification of significant issues and barriers in the exchange of health information. This report also describes the solutions identified by stakeholders to address those issues associated with health information exchange. Project staff met with a broad spectrum of stakeholders throughout Wyoming, all of whom helped assess Wyoming's processes for exchanging health information. While Wyoming has very few examples of electronic health records (EHRs), stakeholders have identified significant issues regarding health information exchange in general and barriers to an electronic health information system in particular.

When the issue of an electronic medical records system is discussed, the central concern of Wyoming stakeholders is cost. Many of the small hospitals and clinics simply cannot afford the infrastructure needed to implement an EHR, and organizations that can afford EHRs are hesitant to purchase them. Interoperability and technology obsolescence are key concerns. Many stakeholders have concerns about investing in systems that will be outdated in a few years or unable to communicate with other systems.

Another major issue uncovered is the regional nature of Wyoming's health care. Because more than 30% of Wyoming's health care is delivered outside the state, many stakeholders view any type of statewide EHR as inadequate. However, these regional concerns must be balanced with a strong state-centered attitude identified among many stakeholders. Stakeholders fear the security and privacy of health care information may be compromised if the current system, which relies heavily on personally and professionally knowing the individual on the other end of the phone, is replaced with an impersonal, electronic system.

The legal and practical issues surrounding redisclosure of medical records, whether paper or electronic, were also a major topic of discussion. Confusion and misinformation on the subject has led many stakeholders to release information much more conservatively than legally required, for fear of potential lawsuits involving wrongful disclosure. Furthermore, this culture of fear leads many health care professionals to release incomplete medical records, because they believe they cannot redisclose another provider's records. There is particular confusion regarding mental health and substance abuse records, the relationship between health care providers and law enforcement, the legal procedure for blood alcohol testing, and other similar issues.


APPENDIX B
DESCRIPTIONS OF HEALTH INFORMATION EXCHANGE DEVELOPMENT AND
HEALTH INFORMATION TECHNOLOGY ADOPTION BY STATE

Table B-1. Descriptions of Health Information Exchange (HIE) Development and Health Information Technology (HIT) Adoption by State
State Description of HIT Development by State
Alaska HIE Overview: Alaska health care leaders and members of the Alaska Telehealth Advisory Council formed the Alaska Regional Health Information Organization (AK RHIO), now known as Alaska ChartLink, which has been working with the support of the Alaska governor's office on the Health Information Security and Privacy Collaboration (HISPC). The HISPC Core Project Team includes members from the State of Alaska, the Alaska Electronic Health Record Alliance, Alaska Native Tribal Health Consortium, physicians, health care consumers, and legal and meeting facilitation contractors. An initiative is under way to assist private practice clinicians in selecting and implementing office-based electronic health records (EHRs).

HIT Adoption: Environment is described as favorable, but adoption is not widespread. Many physicians using electronic billing systems, but only 25% have a functional EHR system.
Arkansas HIE Overview: In the past 5 years the state began to identify and gather resources to put into place infrastructure to support linkage between underdeveloped rural areas (still predominant in Arkansas) and more highly developed urban areas. This linkage enhancement program is currently facilitated by 2 key organizations: the Arkansas Rural Health Collaboration and the Arkansas Foundation for Medical Care. Both have identified expansion of HIT infrastructure to underserved nonurban areas and health care facilities as critical to adequately support creation of a true statewide HIT network.

HIT Adoption: HIT is described as nascent. Conditions favorable for adoption vary geographically: central and northwestern regions have experienced workforce and other resources to support IT and HIT; eastern and southeastern regions lack these resources.
Arizona HIE Overview: Arizona's Health-e Connection, the statewide HIE initiative, which was created by executive order in 2005, is now an active nonprofit organization. Its implementation teams are achieving first-year deliverables. A 5-year Roadmap has been completed. Arizona's first regional health information organization (RHIO), the Southern Arizona Health Information Exchange (SAHIE), has been organized; it developed a business plan and is now developing an implementation plan. Also, the Arizona Health Care Cost Containment System, the State's Medicaid Agency, is organizing an HIE within the Medicaid system.

HIT Adoption: Large practices, hospitals, laboratories, and pharmacies have adopted various forms of HIT. Estimates of HIT adoption among small practices range from 15% to 19%.
California HIE Overview: CalRHIO, California's statewide HIE organization, has been incorporated as a nonprofit organization. Two important tasks have been completed: a Strategic Plan and a vendor selection process to facilitate and operate the statewide HIE.

HIT Adoption: CalRHIO conducts a quarterly inventory of HIT activities in the state. In summer 2006, CalRHIO identified 16 HIE initiatives at various stages of development.
Colorado HIE Overview: CORHIO, Colorado's Regional Health Information Organization is the nonprofit state-level HIE initiative. It incorporates the efforts of the state's Agency for Healthcare Research and Quality (AHRQ) state and regional demonstration project (the Colorado Health Information Exchange, or COHIE) and aims to build a statewide federated interoperable HIE environment. COHIE provides technical expertise and leads prototype development for connecting divergent platforms and products. CORHIO will ultimately support several types of statewide data exchange, including point of care, secure clinical and administrative messaging, and population data exchange. CORHIO's incorporation and building of major components for point of care exchange are under way during 2007.

HIT Adoption: HIT adoption is most advanced along the eastern slope of the Rocky Mountains and in several small western and southwestern cities. The report estimates 10% to 15% of Colorado physicians, mostly in small practices, have implemented EHRs.
Connecticut HIE Overview: Connecticut has established the eHealth Connecticut, the state's acting RHIO. eHealth Connecticut has outlined plans for 5 major projects over the next 2 years, including plans to (1) educate, collaborate, and adopt standards; (2) implement HIE and an e-prescribing project; (3) share HIE information (starting with lab, medication information, and emergency department); (4) implement statewide database of clinical quality and cost information for public reporting; and (5) develop an incentive program for providers to spur the adoption of HIT. In addition, the University of Connecticut Center for Public Health and Health Policy is developing the Connecticut Health Information Network, which uses a federated database architecture in a secure networked environment.

HIT Adoption: A recent survey by eHealth Connecticut indicated 17% of physician offices have implemented EHRs; 25% plan to implement EHR in the near future; and 58% could connect electronically to hospitals.
Florida HIE Overview: In 2004, the governor established the Health Information Infrastructure Advisory Board to advise the state on the development of the Florida Health Information Network (FHIN), an integrated vision intended to guide local health information networks toward interoperability. FHIN will become a network of networks connecting RHIOs and other health networks. Florida has provided funding to spur communities to develop local HIEs. Several HIEs/RHIOs have been established.

HIT Adoption: Florida has participated in the national movement to improve the quality of health care and health outcomes by focusing on how HIT can enhance communications at every level of the health care delivery system.
Illinois HIE Overview: The state's HIE efforts are in an early stage of development. The Illinois Electronics Health Records Taskforce (EHRTF) recently submitted its final report to the Illinois General Assembly. One of the task force's recommendations calls for the creation of a not-for-profit organization, the Illinois Health Information Network (ILHIN), to establish a state-level HIE. The Illinois Department of Public Health would form a public-private partnership with ILHIN to advance EHR and HIE initiatives within the state if task force recommendations are enacted.

HIT Adoption: Another key recommendation of the task force is for the department/ILHIN public-private partnership to create an initiative to foster the adoption of EHR systems by health care organizations and the development of regional HIEs.
Indiana HIE Overview: The Indiana Network for Patient Care is described as the oldest, largest, and most robust clinical HIE in the nation and is at the forefront of HIT. Programs involve public health and scientific researchers as an integral part of the exchange.

HIT Adoption: The state has a well-developed clinical messaging service, has a medication history service, and recently launched an e-prescribing service. The exchange is implementing a service to provide clinical and claims data to support community quality initiatives of payers and providers. While much of central Indiana is quite advanced, other areas are at varying stages of HIE or EHR adoption (or both).
Iowa HIE Overview: The state is in the beginning stages of HIT implementation and interoperability. Several statewide initiatives are under way to encourage the use of HIT and HIE to improve health care quality, including the Iowa HIT Initiative, the Iowa Electronic Medical Records Task Force, and Iowa Medicaid Electronic Records System, which is conducting a pilot to (1) implement portions of an EHR within the Iowa Medicaid program and (2) test electronic sharing of the information with the outside health care community.

HIT Adoption: Most large health care provider organizations in the state are currently implementing EHRs. But the smaller and rural providers are noticeably falling behind.
Kansas HIE Overview: The Kansas Health Care Cost Containment Commission is overseeing development of a plan for the state's HIE initiative. A steering committee has been formed, and a roadmap identifying foundational, organizational, and environmental actions was recently completed.

HIT Adoption: Citing earlier research, a 2006 report by the eHealth Initiative Foundation noted that 21% of physician offices used electronic clinical information of some kind; 51% of hospitals reported electronic access to laboratory results; 34% reported having electronic imaging systems; and 24% reported use of electronic medication administration records. Kansas providers have significant concerns about financing, availability of technical support, and rural high-speed Internet access.
Kentucky HIE Overview: In 2005, the state passed a law authorizing the establishment of the Kentucky e-Health Network. A board was created and charged with overseeing the development of this statewide, interoperable network. The State e-Health Action Plan, a comprehensive strategy to achieve the goals of the Kentucky e-Health Network was completed in April 2007.

HIT Adoption: An initial assessment of the maturity of Kentucky's e-Health efforts showed that the state has few mature local e-health projects; HIT adoption rates are low; and the state has a number of health care markets, with some of the largest ones crossing state lines; Few are large enough, however, to sustain a RHIO or local e-health initiative. There is a clear need for a statewide e-health development and coordinating structure.
Louisiana HIE Overview: In Louisiana, the federal, state, and local governments are actively partnering with private health and human services organizations to design and develop several RHIOs, EHRs, disease registries, and interoperability projects. At least 14 major efforts are currently under way in the state, including the National Coordinator for Health Information Technology-funded Louisiana Health Information Exchange (LaHIE).

The state is also participating in the Gulf Coast Health Information Technology Task Force. More recently, Louisiana has been undertaking a major Healthcare Redesign Project, of which HIT and HIE are a central component. Currently the state is aligning the LaHIE with the new Redesign Project.

HIT Adoption: The report describes HIT development as moderate. Several large, private multisite systems effectively connect thousands of providers electronically through their proprietary closed networks, and Blue Cross Blue Shield (BCBS) provides beneficiaries access to claims data via the Internet. Most providers—especially those in rural areas or in solo practice—do not have access to electronic health information, and most consumers do not yet fully benefit from HIT and HIE.
Maine HIE Overview: Maine's statewide initiative to integrate clinical information started in 2004 with a feasibility study, followed by planning and development stages that culminated in 2006 with the establishment of HealthInfoNet as an independent, nonprofit organization. HealthInfoNet is charged with overseeing the development of the statewide electronic clinical information-sharing network. A state strategic plan was completed, and, more recently, a vendor selection process was also completed. Maine's statewide HIE project has continued planning and developing to address system governance, technical system requirements, and consumer engagement while stressing stakeholder involvement and financial support.

HIT Adoption: In addition to Maine's statewide HIE, there are many organizations with highly advanced HIT development and deployments. Integrated delivery networks (IDNs) have integration between providers, hospitals, labs, mental health system, and public health agencies. Two of the state's larger IDNs are beginning integration of their EHRs. The largest health system in the state has deployed a regional picture-archiving and communication system that will provide computed radiology services for half the population of the state.
Massachusetts HIE Overview: Health information electronic data exchange is in several stages of development. The state has several HIE/HIT initiatives under way, including MA-SHARE and the Massachusetts e-Health Collaborative (MAEHC). The MA-SHARE has been operating as the state RHIO, with several projects under way. In the private sector, pilot projects have also helped develop organizational, contractual, policy, and relationship building blocks for future HIE. Other private-sector HIE projects are designed for ongoing growth, scalability, and business sustainability. In the public sector, the Executive Offices of Health and Human Services (EOHHS), has created a Web portal intended to provide a single access point to all EOHHS initiatives for consumers, providers, legislators, and researchers.

HIT Adoption: MAEHC is leading the charge toward adoption of HIT and EHRs in clinical practices and communities. It has received $50 million commitment from BCBS of Massachusetts to fund its demonstration project phase.
Michigan HIE Overview: Michigan has experienced significant progress in the development and deployment of regional HIEs. There are several efforts under way in various parts of the state, most of them started in the last 2 to 3 years and currently in planning or early implementation stages. In addition, the Michigan Health Information Network recently completed its Conduit to Care strategic planning report, identifying the mission, goals, principles, and short-term and long-term steps for the state HIE initiative. The legislature also passed a law creating the Health Information Technology Commission and appropriating $9.5 million to support regional HIE projects.

HIT Adoption: Like most other states, large Michigan health care organizations have implemented or are in the process of implementing EHRs. Most of the smaller organizations and rural health care providers have not. Recently, the state issued requests for proposals to support HIT investment.
Minnesota HIE Overview: In 2004 the Minnesota e-Health Initiative was established as a private-public collaboration to accelerate the use of HIT in Minnesota. The advisory committee of this initiative is responsible for recommendations to implement a statewide interoperable HIE, including estimates of necessary resources and standards for administrative data exchange, clinical support programs, patient privacy requirements, and maintenance of the security and confidentiality of patient data.

HIT Adoption: Minnesota's e-Health Initiative reported that in 2006 close to 20% of hospitals in the state have fully implemented EHRs, 5% were testing, and 57% were in partial implementation stage. Among clinics, about 17% have implemented, 29% are currently in progress, and close to 30% are planning to implement in the next 2 years. All others are not currently implementing and do not have plans to do so at this point.
Mississippi HIE Overview: There are silos of HIE activity with possibly some crossover but no coordinated statewide activity. No centralized entity has existed in Mississippi to oversee the implementation of a secure, integrated, interoperable health information network and infrastructure. In March 2007 the governor issued an executive order creating the Mississippi Health Information Infrastructure Task Force, charged with developing an overall strategy for the statewide adoption and use of HIT and HIE. There are 24 regional or community exchange activities under way. The state is also participating in the Southern Governors Association Gulf Coast Health IT Task Force.

HIT Adoption: No information available.
New Hampshire HIE Overview: The report describes an excellent foundation for HIE/HIT with programs across the state. The New Hampshire Citizens Health Initiative convened in 2006, the second "NH Connect for Health" summit. A roadmap is being developed under the auspices of the University of New Hampshire and New Hampshire Citizens Health Initiative, to define a strategy for governance, sustainability, clinical use, technical approach, and privacy and security of the state's HIE.

HIT Adoption: Many health care organizations in New Hampshire have implemented varying degrees of HIT that serve as the foundation for the state to build a regional HIE infrastructure. Among them, Capital Regional Health Care's Centricity EMR (electronic medical record) project, has been adopted by all of the state's community health centers. In addition to several grants and projects, many state hospitals have some form of EHR system. A survey conducted by the New Hampshire Hospital Association of members indicated that most hospitals have adopted HIT for patient accounts, inventory and supply management, pharmacy management, and patient records. The most often cited reason for not expanding IT into other areas of hospital systems was the substantial initial investment of operating capital required.
New Jersey HIE Overview: Last year, the New Jersey Hospital Association (NJHA) convened an EHR/EMR Task Force that recommended an extensive business plan and feasibility study. In December 2006 NJHA and BCBS commissioned a more comprehensive feasibility study and plan for the development of a statewide HIE.

HIT Adoption: HIT efforts were initiated 14 years ago with The Healthcare Information Networks Technology Study (1994). These efforts have included legal and regulatory actions to set a framework for providers, trade groups, and state entities to explore cross-industry collaboration and dynamic tactical partnerships to further the goals and promises of Health Insurance Portability and Accountability Act administrative simplification and EHR. Other efforts include a National Provider Identification education, enumeration, and rollout project. More than 200 stakeholders have expressed an interest in working on projects associated with the creation of a RHIO and EHR development.
New Mexico HIE Overview: Efforts to develop an HIE network have been under way for 2 years, led by the New Mexico Health Information Collaborative, a community-based initiative funded by AHRQ, community partners, and the New Mexico State Legislature. The basic technical architecture has been built. Three major network architecture elements are in place: a patient index or medical record locator; an infrastructure for transmitting HIE; and a mechanism to exchange clinical messages electronically and securely. Demonstrations are under way in Taos, New Mexico, to implement the exchange.

HIT Adoption: Large health systems in and around Albuquerque are in the process of implementing EHR systems, and some small cities and towns have adopted EHR. However, the majority of practices, especially small ones, continue to be paper based. The basic technical architecture has been built, and demonstrations are under way to implement the exchange.
New York HIE Overview: There are a number of HIE efforts under way in the state. The state Department of Health convened the HIT Stakeholders Group Planning Committee to develop recommendations on mission, goals, and structure for the statewide HIE initiative. The New York e-Health Collaborative (NYeC) was recently established as a nonprofit organization to develop principles and priorities for the state's HIT strategy; serve as a resource for existing RHIOs and a focal point for communication and education; assess emerging issues and address challenges to interoperability; and support ongoing monitoring and accountability of health IT projects. The next step is to develop a roadmap and strategic plan.

HIT Adoption: The state has secured and made available significant financial resources to promote the adoption of HIT and the development of infrastructure that promotes HIE, including the Health Care Efficiency and Affordability Law for New Yorkers (HEAL-NY) Capital Grant Program, a multiphase, $1 billion initiative to reconfigure the State's health care delivery system and improve health care quality and efficiency. Two of the 4 phases are dedicated to providing investments in regional health IT initiatives. HEAL-NY has provided over $52 million to 26 regional health care networks to support the development of clinical information exchange projects, the creation of e-prescribing capabilities, and the use of EHR systems. Public-private partnerships provide strategic development and evaluation for emerging HIE projects.
North Carolina HIE Overview: Several HIT initiatives are under way to automate medication, laboratory, and radiology data; establish an automated surveillance system for adverse drug events; create an emergency department data repository; and implement an electronic version of prenatal medical records. Communities in the Research Triangle, North Carolina, and Rockingham County, North Carolina-Danville, Virginia, areas are engaged in the prototype of a Nationwide Health Information Network. Various health care stakeholders are discussing and taking action to create and participate in RHIOs.

HIT Adoption: Like other states, North Carolina has seen a significant level of adoption of EHRs among large health care provider organizations in the major cities and a limited number of implementations in rural and smaller provider organizations and clinics.
Ohio HIE Overview: The state is working toward statewide coordination of HIE through public forums hosted by the Health Policy Institute of Ohio (HPIO) and through the development of RHIOs across the state, 2 of which are currently actively engaged in HIE. HPIO has also coordinated the creation of a statewide HIT/HIE Roadmap for Ohio with input from a broad stakeholder base and is providing state legislators and the new governor's office with recommendations for moving forward with statewide coordination and monitoring of HIE efforts. The Roadmap was issued in December 2006.

HIT Adoption: HIT adoption is in an upward trend. Among large hospital systems, most are in the process of implementing enterprise solutions for HIT; none is fully implemented. All of these organizations expect that their vendor will provide an interoperable solution. While some physician practices, large and small, have adopted EHRs, other physician practices may have practice management systems that lack EHRs. Ohio's physicians see the benefit of EHRs, but generally perceive the cost of such systems as prohibitive. Many hospital-affiliated physicians expect their hospital to provide them with an office-based hospital system EHR or expect that the hospital will help subsidize implementation of EHRs in their offices to integrate into RHIO systems being implemented statewide.
Oklahoma HIE Overview: Very little health information is exchanged electronically across organizations, other than for billing purposes or within state and federal government. Several HIE implementations are under way within focused areas of exchange. There is, at this time, no central coordinated effort identified.

HIT Adoption: Most health care providers maintain paper-based patient records, and transfer of protected health information is conducted via fax, mail, telephone, or courier. Hospital emergency rooms in the metro Oklahoma City area are also working on developing an interoperable electronic health care system.
Oregon HIE Overview: The Oregon Health Care Quality Corporation is currently facilitating an initial planning process for the development of a statewide HIE. A high-level report describing options for action toward HIE was released in November 2006 by the Oregon Business Council. The Council has commissioned a more comprehensive study on the business case, finance, and mobilization for a state HIE demonstration project.

HIT Adoption: Vast differences in the sophistication and the level of HIT exist. Oregon has a high degree of EHR adoption in numerous communities around the state. A number of health care organizations have not yet engaged in longstanding statewide discussions regarding the appropriate use of technology to exchange health information and often are not adhering to appropriate privacy and security standards. Attempts have been made to engage these providers, but success has been somewhat limited.
Puerto Rico HIE Overview: The Puerto Rico Department of Health has implemented a regional HIE including the University District Hospital, the Pediatrics Hospital, and the Puerto Rico Medical Services Administration, which share a common database and physical medical records. A second regional HIE effort, the Puerto Rico District Hospital (PRDH) Data Warehouse, includes information from the demographic registry, WIC, immunization, public hospital Health Information System and Electronic Medical Record (HIS/EMR), and public insurance claims. The department is also implementing the Puerto Rico Integrated Health System, a statewide Master Patient Index.

HIT Adoption: Puerto Rico has several private and public HIT initiatives. The PRDH HIS/EMR Project consists of 21 participating public and private primary care facilities and the PRDH to share access to the HIS/EMR provided by PRDH licenses.
Rhode Island HIE Overview: The Rhode Island Health Information Exchange (RI HIE), an initiative of the Rhode Island Quality Institute, is the state's HIE effort. RI HIE is one of the statewide HIEs funded by AHRQ. A state strategic plan and roadmap has been developed, and initial implementation of infrastructure components of the HIE are currently under way.

HIT Adoption: The report describes a continued predominance of paper- and fax-based methods used to support HIE. Rhode Island is at an intermediate level of health IT development. Current statistics are not readily available, but there are important indicators of growth in the use of electronic HIT solutions:

  • hospital-based EHRs are increasing,
  • EHRs in ambulatory settings are slowly gaining interest,
  • e-prescribing adoption is slowly increasing, and
  • statewide HIE is under development.
Utah HIE Overview: Utah Health Information Network (UHIN) is the state's HIE. It currently routes 95% of the state's health care transactions. The state also received one of AHRQ's "State and Regional Demonstrations of Health IT" supporting a community-based effort to design and implement a statewide HIE network. Specific projects are under way to provide electronic sharing of laboratory results from the lab to the doctor, hospital discharge notes from the hospital to the doctor, a patient's medical and medication history from one doctor to another, and e-prescribing. The Utah Department of Health has begun a yearlong planning effort to develop a business plan for the public health system to participate in sharing of clinical information. The Utah Network for Electronic Public Health Information, or the UNIFY project, has the goal of evaluating the potential benefits of sharing information between the clinical care sector and the public health system.

HIT Adoption: HIT is making great strides. UHIN estimates that 20% of Utah physician offices have adopted EHR systems. Specific projects are under way to provide electronic sharing of laboratory results from the lab to the doctor, hospital discharge notes from the hospital to the doctor, a patient's medical and medication history from one doctor to another, and e-prescribing.
Vermont HIE Overview: The Vermont Information Technology Leaders (VITL), a nonprofit organization created through a state legislative initiative, is responsible for creating a statewide HIT infrastructure and a plan including standards, protocols, and pilot programs. In January 2007, VITL submitted a preliminary plan detailing a shared vision and guiding principles for the development of the final strategy, due July 2007.

HIT Adoption: Vermont has much HIT activity in both public and private sectors. A 2006 legislative report proposed 26 IT projects among hospitals and health systems, 10 of which may require HIE with external data sources. Ongoing efforts range from the deployment of large multihospital health care information systems, to EMR deployments for hospital-owned physician practices, to medical imaging and archival solutions. HIT is uneven across the state's hospitals; most have plans to upgrade existing technology in 3 to 5 years.
Washington HIE Overview: In 2005 the state legislature passed a bill requiring the development of a state strategy for the adoption and use of interoperable EHRs and health information technologies. A Health Information Infrastructure Advisory Board has been convened to develop the strategy and to make specific recommendations for a state health information interoperability system, including architecture, business model, and governance. The Advisory Board submitted its report to the legislature in December 2006. The report recommended establishing a board to oversee the initiative, secure funding, and move to implementation. The proposed system is expected to make relevant clinical data from a variety of sources available to patients and providers at the point of care, offer a personal health record for patients, and include a query-able data repository to support syndromic surveillance and population-based chronic illness reporting.

HIT Adoption: State government in Washington has taken a leadership role in promoting the adoption of HIT. One point of the governor's 5-Point Strategy for Improving Health Care in Washington focused on making better use of HIT and adopting EHR systems in all hospitals by 2012. HIT development covers the entire range of technological and operational capability. About 75% of the provider community—primarily small physician groups, solo practitioners, and most public health agencies—are currently using paper-based systems. However, several health care organizations employ state-of-the-art clinical, administrative, and medical record management systems and technologies that support secure HIE. Lack of technology available to such a large proportion of caregivers is a significant barrier to electronic data sharing; however, the sophistication and expertise of many health care organizations is a good foundation for development of HIE solutions.
Wisconsin HIE Overview: In 2005 the governor created the eHealth Care Quality and Patient Safety Board, with the goal of 100% adoption of EHRs systems by health care providers and the appropriate exchange of health information from these systems within 5 years. The board submitted the Wisconsin eHealth Action Plan to the governor in December 2006. The plan lays out a roadmap to achieve this vision.

HIT Adoption: Many large health systems are already moving ahead with EHRs and other investments. A 2005 survey of primary care practices reported that 38% of primary care practice sites used an EHR. A 2006 survey of HIT adoption in 30 rural or very small hospitals (22% of all hospitals in the state) concluded that all hospitals had a core Master Patient Index database; 80% had installed electronic pharmacy, lab, or order entry systems; and few hospitals had interface engines, a lack which inhibits information flow inside the hospital and may hinder participation in HIEs.
West Virginia HIE Overview: In 2006 the West Virginia Health Information Network was established by law. The network is overseen by a board of directors. In September 2006, the board approved a roadmap and strategic plan for the implementation of the network, to be completed in April 2008.

HIT Adoption: The Governor's Task Force on Electronic Health Records and the Regional Health Information Network are expected to facilitate putting critical health care information in the hands of doctors when care is delivered.
Wyoming HIE Overview: The Wyoming Health Information Organization (WyHIO) was established in 2005 as a nonprofit entity charged with developing the health information communication infrastructure in the state to enhance access, quality, safety, and efficiency of health care in Wyoming. WyHIO is currently working on an assessment of HIT adoption in the state.

HIT Adoption: The report indicates relatively little infrastructure supporting large-scale HIE. Several health care facilities use EHR systems, but attempts to create infrastructure that would support interoperability among these and developing EHR systems have not been successful. A private firm in Laramie is developing an interoperable EHR system. However, most hospitals and medical practitioners in the state have consistently expressed a strong aversion to sharing medical data.


APPENDIX C
LIST OF STAKEHOLDERS

Information technology experts
Health information management professionals
Compliance/risk management professionals
Consumers and consumer organizations
Hospital personnel/ER staff
Human resources personnel
Employers, including self-insured employers
Clinicians
Physician groups
Federal health facilities
Public health departments
Community clinics and health centers
Laboratories
Long-term care facilities and nursing homes
Homecare and Hospice
Medical and public health schools that undertake research
Correctional facilities personnel


APPENDIX D
GLOSSARY OF ACRONYMS

Acronym Description
ADD attention deficit disorder
ADHD attention-deficit/hyperactivity disorder
AHIMA American Health Information Management Association
AHRQ Agency for Healthcare Research and Quality
BAA business associate agreement
CCHIT Certification Commission for Health Information Technology
CCR continuity of care record
CDC Centers for Disease Control and Prevention
CLIA Clinical Laboratory Improvement Amendment
CMS Centers for Medicare & Medicaid Services
eHIE electronic health information exchange
EHR electronic health record
EMR electronic medical record
ER emergency room
ERISA Employee Retiree Income Security Act
FERPA Family Educational Rights and Privacy Act
FTP File Transfer Protocol
HIE Health Information Exchange
HIIAB Health Information Infrastructure Advisory Board
HIPAA Health Insurance Portability and Accountability Act of 1996
HIS Health Information System
HISPC Health Information Security and Privacy Collaboration
HIT Health Information Technology
HITSP Health Information Technology and Standards Panel
HMO Health Maintenance Organization
IAS Interim Analysis of Solutions
IAV Interim Assessment of Variation (of Business Practices, Policies, and State Law)
IHDS Integrated Health Delivery System
ILHIN Illinois Health Information Network
IPWG Implementation Planning Work Group
IRB Institutional review board
IT Information technology
IVR Interactive Voice Response
LWG Legal Work Group
NCCUSL National Conference of Commissioners on Uniform State Laws
NGA National Governors Association
NHIN Nationwide Health Information Network
NPI National Provider Identifier
ONC Office of the National Coordinator for Health Information Technology
PBM pharmacy benefit manager
PMO project management office
PHI protected health information
PMT project management team
RHIO regional health information organization
RLS record locator service
SRD state and regional demonstration
SSL secure sockets layer
SWG Solutions Work Group
TAP Technical Advisory Panel
TB tuberculosis
VPN virtual private network
VWG Variations Work Group


Endnotes

 1 Throughout this report the 33 states and 1 territory are referred to as the state project teams or as the state teams.

 2 The terms consent and authorization have specific meanings in the context of various state and federal laws. Although context must be considered when examining a specific statute, here the terms are used to generally mean a signed permission to release or disclose protected health information.

 3 Five of the 8 states making this recommendation referred specifically to a national standardized business associate agreement, and 3 state teams referred to contractual or participant agreements. None of the states used the more specific term business associate contract. HIPAA requires covered entities to document they have obtained satisfactory assurance that their business associate will safeguard health information through a written contract or other written agreement or arrangement. The Privacy Rule has specific provisions for business associate contracts and other arrangements. The other arrangements category includes, for example, memorandums of understanding between agencies. Thus, the term business associate agreement encompasses both contracts and other arrangements, so this term is used in the summary above.

 4 These types of agreements are common and required by both the HIPAA Privacy and Security Rules. BAAs are executed whenever a third party performs certain services for a covered entity that includes access to PHI. For example, organizations receiving PHI and serving as a platform for many regional or local data exchange systems on behalf of covered entities would be a business associate of all covered entities that use the organization's services.

 5 45 C.F.R. § 164.512(i)(2)(ii).

 6 42 C.F.R. pt. 2 uses the term alcohol and drug abuse. Most of the states used the term substance abuse. This summary has adopted the terminology from the federal regulation for consistency.

 7 Freeman, RE. Strategic Management: A Stakeholder Approach. Boston, Mass: Pitman Publishing Company; 1984.

 8 The terms consent and authorization have specific legal meanings in the context of various state and federal laws, including the HIPAA Privacy Rule. Although context must be considered when determining the proper term to use under a specific law, here the term consent is used to generally mean a signed permission to release or disclose PHI, unless otherwise noted.

 9 Some of this confusion may be the result of the consent provision's being amended between its original release in 2000 and its implementation in 2003. When it was originally released, the HIPAA Privacy Rule required patient consent for treatment, payment, and health care operations. This provision was amended in 2002, and obtaining consent became optional.

 10 Other permissible disclosures that do not require consent or authorization include instances when disclosure is required by another law; for research, subject to approval by an institutional review board; incident to an otherwise permitted use and disclosure; for public health; for law enforcement; for other specified disclosures in the public interest. In addition, information can be disclosed in a patient directory or to family/friends only with the opportunity for the patient to agree or object to the disclosure.

 11 The US Department of Health and Human Services (HHS) may impose fines of $100 per failure to comply with the HIPAA Privacy Rule, up to $25,000 for violations of the same requirement. Individuals who knowingly disclose personally identifiable information face fines of up to $50,000 and a year in prison. These penalties increase if there was intent to profit from the disclosure or if the information was obtained under false pretenses.

 12 The terms consent and authorization have specific meanings in the context of various state and federal laws. Although context must be considered when examining a specific statute, here the terms are used to generally mean a signed permission to release or disclose personal health information.

 13 The federal regulations require that state Medicaid programs implement safeguards to protect Medicaid data. Thus, state standards actually restrict exchange, although federal statute and regulations mandate those standards.

 14 The federal law can be found in the Social Security Act, 42 U.S.C. §§ 1396a(a)(7), 1902(a)(7). The regulations can be found in 42 C.F.R. § 431.300 et seq. The definition of plan administration is found in § 431.302.

 15 Appendix C: HITSP Common Building Blocks, June 2006 standards.

 16 As noted earlier in the report, none of the states distinguished business associate agreement from the more specific term business associate contract. The Health Insurance Portability and Accountability Act (HIPAA) Rules require covered entities to document they have obtained satisfactory assurance that their business associate will safeguard health information through a written contract or other written agreement or arrangement. The Rules have specific provisions for business associate contracts and other arrangements. The other arrangements category includes, for example, memos of understanding between agencies. Here, the term HIE agreement is used as a means to encompass all forms of arrangement between entities.

 17 Five of the 8 states making this recommendation referred specifically to a national standardized business associate agreement, and 3 state teams referred to contractual or participant agreements. None of the states used the more specific term business associate contract. The HIPAA Rules require covered entities to document they have obtained satisfactory assurance that their business associate will safeguard health information through a written contract or other written agreement or arrangement. The Rules have specific provisions for business associate contracts and other arrangements. The other arrangements category includes, for example, memos of understanding between agencies. Thus, the term business associate agreement encompasses both contracts and other arrangements so this term is used in the summary above.

 18 These types of agreements are common and required by the HIPAA Privacy and the Security Rules. BAAs are executed whenever a third party performs for a covered entity certain services that include access to PHI. For example, organizations receiving PHI and serving as a platform for many regional or local data exchange systems on behalf of covered entities would be a business associate of all covered entities that use the organization's services.

 19 45 C.F.R. §§ 164.502(b), 164.514(d).

 20 OCR HIPAA Privacy Rule, December 3, 2002; revised April 4, 2003.

 21 42 C.F.R. pt. 2 uses the term alcohol and drug abuse. Most of the states used the term substance abuse. This summary has adopted the terminology from the federal regulation for consistency.

 22 Although C.F.R. pt. 2 applies only to federally funded programs, that term is broadly defined and most alcohol or chemical dependency providers must comply with the regulation. In addition, most other providers in this field require a patient's consent before disclosing clinical data either due to ethical obligations or liability concerns.

 23 The federal regulations require that state Medicaid programs implement safeguards to protect Medicaid data. Thus, state standards actually restrict exchange, although federal statute and regulations mandate those standards.

 24 The federal law can be found in the Social Security Act, 42 U.S.C. §§ 1396a(a)(7), 1902(a)(7). The regulations can be found in 42 C.F.R. § 431.300 et seq. The definition of plan administration is found in § 431.302.

Appendix Endnotes

Data architecture is the method by which medical records are organized to ensure that the appropriate data is accessed for the appropriate purpose and only by the authorized entity.

Data Classification is the content of the folders that contain medical records, such as a folder that may contain sensitive information accessible to limited entities for limited purposes.

The estimated number 47 is based on the total number of discrete business practices presented in theory, not necessarily on nomenclature.

The term law used here refers to relevant regulation, statute, or case that is the primary underlying driver behind a business practice.

More information on the Minnesota e-Health Advisory Committee's activities can be found at http://health.state.mn.us/e-health.

Contract #290-05-0015 from the Agency for Healthcare Research and Quality.

Institute of Medicine. To err is human: Building a safer health system [Institute of Medicine website]. November 1, 1999. Available at: http://www.iom.edu/?id=12735. Accessed May 9, 2007.

All Washington State HISPC reports, Interim Assessment of Variations (containing all identified business practices), Interim Analysis of Solutions, and Interim Implementation Plan, are available on the Qualis Health website: www.qualishealth.org/HISPC.

RTI defined a barrier to health information exchange as a practice, policy, or law that impedes, prohibits, or imposes conditions on HIE (without judgment regarding the degree of appropriateness for the barrier in question).

10  Capture: The process of collecting patient identifiers from a patient.

11  Patient identifiers: information collected from a patient to assist in the identification of the patient (eg, name, birth date, address).

12  Verification: The process of confirming that patient identifiers are correct.