organizational panel
play

Organizational Panel Office of Health Information Technology - PowerPoint PPT Presentation

HIT/HIE Community and Organizational Panel Office of Health Information Technology January 14, 2016 Welcome, Introductions, and Agenda Review Agenda OHA Behavioral Health Information Sharing Advisory Group: Update and discussion


  1. HIT/HIE Community and Organizational Panel Office of Health Information Technology January 14, 2016

  2. Welcome, Introductions, and Agenda Review

  3. Agenda • OHA Behavioral Health Information Sharing Advisory Group: Update and discussion • Jefferson HIE ONC Grant: Update and discussion • HealthTech Solutions: Security Lifecycle presentation and discussion • HITOC Charter, workplan and priorities • Roundtable: Brief updates, successes, and challenges • HCOP future topics 3

  4. Behavioral Health Information Sharing Advisory Group Veronica Guerra, Policy Lead Melissa Isavoran, Policy Lead

  5. Agenda Goals • Review of the Behavioral Health Information Sharing Workgroup • Advisory Group work plan and timeline • Overview of webinars • Next steps and resources 5

  6. Overview of the Advisory Group • Need: Lack of understanding of Part 2 and state laws impacted CCOs’ care coordination ability • Goal: To develop solutions to support integrated care and enable sharing of behavioral health information between behavioral and physical health providers • Members/Partners: Internal staff from across the agency Priorities: - Outreach to stakeholders - Education - Leverage existing IT solutions - Develop tools to facilitate information sharing 6

  7. Advisory Group Work Plan • Conduct provider survey to understand barriers to sharing behavioral health information • Develop a webpage with resources for providers • Conduct a series of webinars • Develop a model Qualified Service Organization Agreement (QSOA) for use with Part 2 providers and HIEs • Develop a toolkit covering privacy laws, case studies of allowable sharing, model forms (consent and QSOA), and FAQs • Engage federal partners in discussions about modifications to Part 2 7

  8. Timeline Convened Provider Survey Advisory Group 2/27/2015 10/1/2014 Toolkit and Provider Follow-Up Model QSOA Interviews Development 7/1/2015 4/1/2016 Q1 Q1 2014 2016 Q4 Q2 Q3 Q4 Q2 2015 2016 Webinar #3 Webinar #1 Webpage and 2/23/16 9/29/2015 Resource List 2/23/15 Webinar #2 Webinar #4 12/17/2015 Date TBD

  9. Webinars • Webinar #1: September 29, 2015 o Topic: Overview of state and federal privacy laws o Presenters: SAMSHA, the Legal Action Center, and the Oregon Department of Justice o Attendees: 300 • Webinar #2: December 17, 2015 o Topic: Deeper dive into federal privacy laws with use case examples from providers o Presenters: Robert Belfort, from Manatt, Phelps & Phillips, LLP o Attendees: 275 • Webinar #3: February 2016 o Topic: Overview of Oregon’s HIT/HIE infrastructure and current work on behavioral health information sharing o Presenters: Susan Otter, OHA Office of Health Information Technology, and Gina Bianco, Jefferson HIE • Webinar #4: April/May 2016 o Topic: Overview of provider toolkit on behavioral health information sharing and intended uses. 9

  10. OHA’s Next Steps • Legal Action Center Actionline services • Conduct two additional webinars • Develop a model Qualified Service Organization Agreement • Collaborate on OHA and Jefferson HIE ONC grant • Develop a provider toolkit covering privacy laws, case studies of allowable sharing, model forms, and FAQs • Engage federal partners in discussions about modifications to Part 2 • Continue to consult with other states 10

  11. Resources For more information about the Behavioral Health Information Sharing Advisory Group and access to webinar recordings, please visit: http://www.oregon.gov/oha/amh/Pages/bh-information.aspx 11

  12. HIT/H /HIE IE Co Community mmunity and d Org rganizationa anizational l Pa Panel el Meeting eting Janua nuary ry 14, , 2014 14 Gina na E. Bi Bianc nco, o, MP MPA Acti ting ng Direct ector or

  13.  New Data Sources ◦ Discrete hospital data & ambulatory CCD  Sequoia Project Certification ◦ VA Data Exchange  Clinical Event Notifications ◦ Integrated with Community Health Record  PDMP Connectivity ◦ Dependent upon legislative change  Behavioral Health Information Exchange

  14.  Develop universal interpretation of law for the exchange, disclosure, and re-disclosure of drug, alcohol and mental health data  Develop common consent management model (CMM) ◦ Common Release of Information form ◦ Requirements for electronic data exchange  Implement CMM within JHIE technology to enable robust exchange  Connect with behavioral health EHRs

  15.  Qualified Service Organization Agreement ◦ Required between JHIE and data contributors  Consent must be captured for disclosure of: ◦ Addictions information (Part 2) ◦ Psychotherapy notes  Re-disclosure is not allowed without explicit patient consent

  16.  Emergency Setting ◦ Must document reason for querying  CCOs ◦ For TPO, including care coordination and audit/evaluation

  17.  Behavioral Health Survey ◦ EHR Use and capabilities  Develop Common Consent Form ◦ For use on paper and electronically  Document Technical Requirements  Behavioral Health Exchange Summit ◦ April 12, 2016 (tentative)

  18. Break 19

  19. Security Life Cycle National Institute of Standards and Technology Presented by Carla Raisler Privacy is a right that people have; Security is the protection of that right.​

  20. Qualifications Carla is a Certified Information Systems Security Professional • 15 years of experience in enterprise technology service design, development and implementation • Extensive experience with IT Security, confidential information, and network architecture Carla A. Raisler • ITIL v3, Security+, Expertise in Security and Risk Management, Asset Security, Communications and Network CISSP Security, Identity and Access Management, HealthTech Solutions Security Assessment and Testing, HIPAA compliance

  21. NIST is the federal technology agency Architecture Organizational Input that works with • Laws, Directives, Policy, Description industry to develop Starting Point Guidance • Business Processes and apply technology, • FIPS 199 / SP 800-60 Strategic Goals and Objectives • FEA Reference Models • Information Security measurements, and • Segment & Solution CATEGORIZE Requirements Architectures standards. • Priorities and Resources • Information System Information System Availability Boundaries FIPS – Federal Information Processing FIPS 200 / SP 800-53 SP 800-37 / SP 800-53A Standards FIPS 199 Standards for Security MONITOR SELECT Categorization Security Controls Security Controls FIPS 200 Minimum Security Requirements Security Life SPs – Special Publications SP 800-60 Mapping Information Types Cycle to Security Categories SP 800-39 SP 800-53/53A Security and Privacy Controls catalog/assessment SP 800-70 SP 800-37 procedures AUTHORIZE IMPLEMENT SP 800-70 Security Configuration Checklists Program for IT Products Information System Security Controls SP 800-37 Guide for the Security SP 800-53A Certification and Accreditation SP 800-137 Information Security ASSESS Continuous Monitoring SP 800-39 Managing Information Security Controls Security Risk

  22. SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)}, where the acceptable values for potential impact are low, moderate, or high. For impact on information systems, organizations must, as a minimum, employ appropriately tailored Guarantee of Assurance that the security controls from the reliable access to information is low, medium, or high the information by trustworthy and authorized people accurate baseline of security controls defined in NIST Special Publication 800-53 and must ensure that the minimum assurance requirements associated with the low Set of rules that baseline are satisfied. limits access to information CATEGORIZE: Define criticality/sensitivity of information system according to CATEGORIZE potential worst-case, adverse impact to business Information System

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend