Massachusetts Health Data Consortium CAQH CORE - NEHEN - VeriSign/Symantec Pilot. September 2010

Similar documents
HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance

Health Information Exchange - A Critical Assessment: How Does it Work in the US and What Has Been Achieved?

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET

Projecting and Budgeting Costs and Savings of HIPAA Compliance

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances

Leveraging the LincPass in USDA

Standards Readiness Criteria. Tier 2

Outcomes and Lessons Learned From 5010 Testing Project Collaboration

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.

The New England Approach to HIPAA. John D. Halamka MD Chairman, New England Health EDI Network CIO, CareGroup Healthcare System

Helping Meet the OMB Directive

(60 min) California State Updates

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Federal-State Connections: Opportunities for Coordination and Collaboration

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Update for the Workgroup for Electronic Data Interchange (WEDI) July 31, 2018

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Federated Authentication for E-Infrastructures

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Phase IV CAQH CORE 470 Connectivity Rule v4.0.0

Leveraging HSPD-12 to Meet E-authentication E

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

New England Telehealth Consortium. Healthcare Connect Fund Network Plan

CAQH ProView. Dentist Practice Manager Module User Guide

Phase IV CAQH CORE Certification and Testing Policies v4.0.0

Electronic Payments & Statements (EPS) Frequently Asked Questions (FAQs)

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Nuts-n-Bolts of Product Testing and Certification Session #112, March 7, 2018 Steven Posnack MS MHS, Dir. Office of Standards and Technology, ONC, US

Information Technology (CCHIT): Report on Activities and Progress

Establishing Trust Across International Communities

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

DOCUMENT CHANGE HISTORY

California State Updates. Presenter: David A. Minch, President & COO, HealthShare Bay Area

FPKIPA CPWG Antecedent, In-Person Task Group

Interagency Advisory Board Meeting Agenda, February 2, 2009

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017

Single Secure Credential to Access Facilities and IT Resources

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction

FiXs - Federated and Secure Identity Management in Operation

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption

EPCS in the State of New York

4) Organization NPI (Can be retrieved from the NPPES NPI Registry here:

ASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003

Compliant. Secure. Dependable.

Federated authentication for e-infrastructures

Testing for Reliable and Dependable Health Information Exchange

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Trust. Trustworthiness Trusted. Trust: Who? What? When? Why? How?

Managing Trust in e-health with Federated Identity Management

A Pilot Implementation of DIRECT Messaging and Provider Directory Services in the Palomar Health District

Interagency Advisory Board Meeting Agenda, August 25, 2009

Identity Federation: security for multiple services in a trusted environment.

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

The Smart Campaign: Introducing Certification

Change Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account

Direct, DirectTrust, and FHIR: A Value Proposition

Phase III CAQH CORE 305 Enforcement Policy version January Table of Contents

Summary of Gartner COMPARE Survey of HIPAA Readiness Conducted Feb-March 2003

S&I Framework Initiatives

Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

Prior Authorization and Clinician Burden: Updates from ONC

Frequently Asked Questions

IT in Healthcare Day

220 Burnham Street South Windsor, CT Vox Fax

IT Attestation in the Cloud Era

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions

Use Case Study: Reducing Patient No-Shows. Geisinger Health System Central and Northeastern Pennsylvania

ECA Trusted Agent Handbook

NHII and EHR: Protecting Privacy and Security - Current Issues and Recommendations

Cloud Security Alliance Quantum-safe Security Working Group

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Strategic Implementation of the National Health Information Network (NHIN)

NCQA and HIPAA. The Fifth National HIPAA Summit. A match made in? Sharon King Donohue, JD General Counsel, Chief Privacy Officer November 1, 2002

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

Healthcare Information and Management Systems Society. U.S. Healthcare Industry HIPAA Compliance Survey Results: Summer 2005

The Windstream Enterprise Advantage for Healthcare

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Better Mutual Authentication Project

ASC X12 Clearinghouse Caucus

Higher Education PKI Initiatives

DigitalPersona Altus. Solution Guide

Scaling Interoperable Trust through a Trustmark Marketplace

NIS Standardisation ENISA view

CORE Connectivity Rules: Leading the Way in Healthcare Administrative Communications

Technology Aspects of Health Information Exchange. Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics

Trusted Computing Today: Benefits and Solutions

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

Cyber Partnership Blueprint: An Outline

End of Pathway Assessment (EOPA) Update

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,

Interagency Advisory Board Meeting Agenda, December 7, 2009

Secure Government Computing Initiatives & SecureZIP

Sequoia Project Content Testing Pilot Didi Davis Director Testing Programs

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Re: Draft Trusted Exchange Framework & Draft U.S. Core Data for Interoperability

DigitalPersona for Healthcare Organizations

Transcription:

Massachusetts Health Data Consortium CAQH CORE - NEHEN - VeriSign/Symantec Pilot September 2010

Agenda CAQH status CORE UPD Pilot overview Q&A 2

HR 3590 Patient Protection and Affordable Care Act: Section 1104 The concept of operating rules is addressed in the health reform bill in section 1104, which focuses on administrative simplification. Requires the Secretary to adopt and regularly update standards, implementation specifications, and operating rules for the electronic exchange and use of health information for the purposes of financial and administrative transactions. Rule writing and mandated implementation occur Rule adoption deadlines July 2011 Eligibility and Claims Status July 2012 Claims remittance/ payment and electronic funds transfer (plus health plan ID) 2013 July 2014 Enrollment, Referral authorization, attachments, etc 2015 2016 *Red font indicates where CORE Phases I III has placed a focus. Effective/ Implementation deadlines for health plans Jan 2013 Jan 2014 Jan 2016 3

Why a Pilot and Why These Sponsors? In the next few years, it is estimated that more than 700,000 physicians and more than 185 million consumers will go online to exchange sensitive health information. How will the industry ensure: Security, interoperability, privacy and authentication of organizations and users Currently, there is no industry consensus on requirements for the industry to authenticate administrative data exchange: CORE has an established process for creating and driving adoption of common connectivity/security methods that are aligned with clinical efforts, e.g. ONC s HITSP and NHIN CORE is sponsored by CAQH, which also sponsors UPD UPD has a critical mass of providers who want simplified connectivity/security MA: Approximately 28,500 MDs/DOs operate in state and 85% use UPD NEHEN is a leader in data exchange and related policy setting, and many of its participants are CORE-certified VeriSign/Symatec is a leader in PKI/authentication services 4

What is the Pilot? What Are The Objectives? Background System-to-System authentication using digital certificates is required by CORE Phase II Connectivity Rules; future phases will consider user-level authentication. Effective enforcement of authentication requires rules of the road for trust and certificate practices. Administrative simplification is needed given the number of users and the levels of trust involved. Objectives Identification of policy and standard gaps in the implementation of X.509 Digital Certificates for a vendor neutral PKI environment for streamlined node authentication: Evaluate policy and standards requirements for interoperability, while supporting a limited set of PKI providers (Certificate Authorities) to ensure vendor neutrality Validate solution by piloting within NEHEN using Symantec PKI, but with ability to add other PKI vendors at the topmost level of PKI hierarchy (ie as Root CAs) Evaluate requirements for a single digital credential per healthcare provider issued by one of a few PKI vendors, such that Health Plans recognize and accept that credential Evaluate feasibility of leveraging datasources such as CAQH s UPD for identity proofing of providers and assisting with certificate management Ongoing alignment with and input towards direction of national regulations and standards. Lessons learned will be incorporated into future NEHEN policy debates, CORE Connectivity requirements and publically shared. 5

Pilot Success Factors Generate a focus on the need for national, cost-effective and adaptable PKI policies solutions that build trust. Demonstrate that Certificate enrollment and management process for Healthcare Providers (clients) and Health Plans (servers) can be streamlined. Healthcare Providers (clients) can use a single digital identity to access multiple Health Plans (servers), where the digital identity is obtained from a limited set of Certificate Authorities (i.e., vendor neutral). Health Plans (servers) have reduced administrative overheads to allow connections from Healthcare Providers (clients), using credentials from a limited set of Certificate Authority vendors. Identify any gaps in policy/implementation to inform future national debate and CORE rule development. 6

What Are the Benefits to Pilot Participants? Front seat in developing a trust framework needed by the industry. Voice in how operating rules and related initiatives are implemented, using real-world feedback. Understand your organizations implementation requirements and pain points. Ensure barrier to adoption such as cost and administrative simplification are considered as these new technologies roll-out. 7

Pilot: Timeline, Key Steps and Resources Required Time Six months Key steps Agreement on pilot participants and milestones Data gathering, e.g. interviews, questionnaire on-site at each participant location Use case agreement, e.g. mix of sensitive/non-sensitive administrative data Written summary of results and identification of potential policy implications Primary time and resources required: leadership, technical, and external communications 30+ hrs technical: 10-20 man-hours per participant for interviews/discovery, based upon CORE PKI Assessment Participant Questionnaire; 10 hours per application, for engineering and configuration to work with certificates. CAQH CORE is providing VeriSign/Symantec resources, NEHEN is managing pilot participants and all three organizations will collaborate on project management Review and input on summary of findings 8

E-Authentication Assurance Levels HSPD-12 PIV Card Increased Strength PIN/User ID Low Access to Protected Website One-Time Password Knowledge -Based Medium Applying for a Loan Online PKI/ Digital Signature Biometrics High Multi-Factor Token Obtaining Govt. Benefits Very High Security Clearance Application Increased Need for Identity Assurance