Difference between revisions of "TEFCA"

From MgmtWiki
Jump to: navigation, search
m (Context)
(Context)
Line 5: Line 5:
 
The context of TEFCA connection is an [[FHIR]] interaction with the transfer of [[PHI]] between [[Secure Node]]s, although other transactions could travel on the same connection.
 
The context of TEFCA connection is an [[FHIR]] interaction with the transfer of [[PHI]] between [[Secure Node]]s, although other transactions could travel on the same connection.
  
The Draft Trusted Exchange Framework is intended to enable Health Information Networks (HINs) to
+
The Draft Trusted Exchange Framework ([https://www.healthit.gov/buzz-blog/interoperability/moving-beyond-closed-networks-an-update-on-trusted-exchange-of-health-information Draft two]) is intended to enable Health Information Networks (HINs) to securely exchange electronic health information with each other to support a wide range of
securely exchange electronic health information with each other to support a wide range of
 
 
stakeholders. The draft Trusted Exchange Framework sets up an ecosystem wherein Qualified HINs
 
stakeholders. The draft Trusted Exchange Framework sets up an ecosystem wherein Qualified HINs
 
connect to each other to support the use case of broadcast and directed query for treatment, payment,
 
connect to each other to support the use case of broadcast and directed query for treatment, payment,

Revision as of 14:56, 19 April 2019

Full Title or Meme

Trusted Exchange Framework and Common Agreement (TEFCA)[1]

Context

The context of TEFCA connection is an FHIR interaction with the transfer of PHI between Secure Nodes, although other transactions could travel on the same connection.

The Draft Trusted Exchange Framework (Draft two) is intended to enable Health Information Networks (HINs) to securely exchange electronic health information with each other to support a wide range of stakeholders. The draft Trusted Exchange Framework sets up an ecosystem wherein Qualified HINs connect to each other to support the use case of broadcast and directed query for treatment, payment, operations, individual access, public health, and benefits determination purposes. To enable the broadest set of use cases, Qualified HINs and their participants are required to be able to exchange the USCDI when such data is available (i.e. if a participant or Qualified HIN does not capture or have access to a specific data class, they are not expected to be able to exchange that data class). By requiring Qualified HINs and their Participants to be capable of exchanging the USCDI, the Trusted Exchange Framework will, over time, be able to support the Cures Act requirement of all electronic health information from a patient’s record being available.

In an effort to develop and support a trusted exchange framework for trusted policies and practices and for a common agreement for the exchange between HINs, the proposed Trusted Exchange Framework supports four important outcomes:

  1. providers can access health information about their patients, regardless of where the patient received care;
  2. patients can access their health information electronically without any special effort;
  3. providers and payer organizations accountable for managing benefits and the health of populations can receive necessary and appropriate information on a group of individuals without having to access one record at a time (Population Level Data), which would allow them to analyze population health trends, outcomes, and costs; identify at-risk populations; and track progress on quality improvement initiatives;
  4. the health IT community has open and accessible application programming interfaces (APIs) to encourage entrepreneurial, user-focused innovation to make health information more accessible and to improve electronic health record (EHR) usability.

Problems

  • FHIR is focused on the data access methods and encoding leveraging existing Security solutions. Security in FHIR needs to focus on the set of considerations required to ensure that data can be discovered, accessed, or altered only in accordance with expectations and policies.
  • Privacy in FHIR is focused on the data access methods and encoding leveraging existing Security solutions. Security in FHIR needs to focus on the set of considerations required to ensure that data can be discovered, accessed, or altered only in accordance with expectations and policies.

Solutions

References

  1. HealthIT.gov, Trusted Exchange Framework and Common Agreement. https://www.healthit.gov/topic/interoperability/trusted-exchange-framework-and-common-agreement
  2. The Office of the National Coordinator (ONC) for Health Information Technology, Draft Trusted Exchange Framework. (2018) Section 2 - How Will it Work p. 9ff https://www.healthit.gov/sites/default/files/draft-trusted-exchange-framework.pdf
  3. The Office of the National Coordinator (ONC) for Health Information Technology, A User’s Guide to Understanding The Draft Trusted Exchange Framework (2017) https://www.healthit.gov/sites/default/files/draft-guide.pdf

Other sources