This practice area addresses the following Markle Connecting for Health Core Principles for a Networked Environment:
Individual Participation and Control
Data Quality and Integrity
See Architecture for Privacy in a Networked Health Information Environment for more information.
Opinion surveys reveal that most Americans want to be able to get electronic copies of their health information.1 Generally, business data streams in health care provide consumers with few opportunities to control the flow of their data, particularly when third party payers are involved. (See CT1: Technology Overview.) In contrast, consumer obtainment and control are the core attributes of the copies of data that flow into and out of PHRs.2
There is a substantial range of views about what constitutes "control" for consumers. Some clinicians worry about the reliability of consumer-sourced information, or are concerned that consumers might withhold or alter their records in a way that ultimately compromises their care. It is useful to reiterate three concepts that recur throughout this paper:
The term "personal health records" is inadequate because of its emphasis on "records" as past information. To make sense of their health and health care, consumers likely want useful tools and convenient services more than mere records. Some prefer the term "personal health applications." However, we use the term PHR because it has become a term of art. Below are the broad definitions we use for the applications used by health consumers and clinicians:
This paper identifies six dimensions of consumer access and control in a networked PHR environment. The specific levels of consumer control may vary depending on the type of the Consumer Access Service and/or the PHR application in use.3 The following discussion recommends general practices and identifies areas that require further collaborative definition.
Consumers should have a convenient means to request electronic copies of their information from health data sources. We recommend that stakeholders work on a standard electronic messaging "envelope" for consumers to authorize health data sources to exchange electronic copies of their health information with Consumer Access Services of the consumers' choosing, plus standard protocols for reliably routing such requests and authorizations. The concept is similar to online banking, in which consumers can download transaction histories in industry-standard formats from their multiple financial institutions into applications they control on their desktop computers.4
Consumer Access Services should facilitate convenient access for consumers to obtain copies of their personal health data in electronic formats. Requests on behalf of a consumer to obtain electronic copies of information about the consumer from Health Data Sources must be explicitly authorized by the consumer, and should conform to standard formats and protocols as such standards and protocols become available.
It is generally agreed that PHRs should enable an individual account holder to designate someone else, such as a family member, care provider, caregiver, or legal guardian, to act on the account holder's behalf. Proxy permissions can vary depending on the individual account holder preferences and the role of the proxies. It goes beyond the scope of this paper to explore the application-level functionality of designating such permissions in detail.
The required policies involve complex tradeoffs, particularly where minor children may have health issues they'd prefer be kept private, but lack legal authority to block proxy access to their information (state laws and local practices vary widely in this regard), or where grown children are handling the health information or setting up an account for incapacitated parents. A proxy access protocol that may work well in one family context could be overly revealing or obstructive in a different household.
Similarly, appropriate proxy access protocols will necessarily vary depending, for example, upon whether the proxy is a lay guardian or caregiver, whether the individual is capable of designating a proxy, whether the proxy is initiating an account for a dependent child or parent, whether there is a special use case such as an unconscious patient in an emergency room, etc. Because these issues require deliberation beyond the scope of our Work Group, we offer only general recommendations:
The consumer's ability to designate proxy access should be as specific as feasible regarding:
In addition, proxy access should be:
(Note: Time-limiting or revoking proxy access is typically on a "going-forward" basis; it will not "recall" information previously obtained and copied by a proxy. Example: A consumer named Millie provides proxy access to her caregiver and her doctor, then later revokes it. Both proxies had made electronic copies of Millie's information into their own systems during the time they had legitimate access to Millie's information. Millie's act of revoking proxy access does not mean that the information her caregiver or her doctor obtained is somehow automatically "erased" or "withdrawn" from their systems. Those former proxies may keep or erase the copies of Millie's information depending on the proxies' own policies and obligations under which they obtained the information. In this example, the doctor's obligation to retain information may differ substantially from those of the caregiver.) (See Area 4: Retention of Information below.)
Under HIPAA, consumers have the right to request that information be added to their health data held by Covered Entities to make it more accurate or complete. Consumer Access Services, whether HIPAA-covered or not, have the potential to engage consumers in the essential and never-ending effort to improve data quality across the health sector. We recommend a multi-stakeholder effort to define a standard messaging envelope and markup language for consumers to request amendments or dispute entries to their information obtained through consumer data streams.
To the extent feasible, Consumer Access Services can facilitate the routing of such requests back to health data sources. This practice area concerns only information that is professionally sourced (e.g., from a doctor's office, hospital, lab, pharmacy, payer, etc.) We presume that consumers will be able to edit or delete their own data entries at will.
Users should be able to identify any errors or omissions in the posted information and be afforded a process to communicate requests for changes back to the original source of information.
A Consumer Access Service should provide notice to users as to whether a request to modify a record requires that the user submit a request to the Consumer Access Service, or directly to the appropriate Health Data Source. If the former, the Consumer Access Service should provide an easy and convenient method for the consumer to request corrections. If the latter, the Consumer Access Service should notify the user that he needs to contact the Health Data Source directly. Ideally, the Consumer Access Service should provide information about how the user can contact the original source(s) of information that the consumer believes to be in need or amendment (e.g., the original source's customer service 1-800 number).
Consumer Access Services should provide mechanisms to route data correction requests and responses between consumers and Health Data Sources electronically as standards and protocols for such requests and responses become widely available. Ideally, such standard messages will include:
Statutes vary from state to state regarding the time that medical professionals are required to retain patient information. The average requirement for record retention is 5 to 7 years after the patient has last visited, although some states require data retention much longer. Information maintained in Consumer Access Services offered by health professionals or health care facilities may be subject to such laws. Many Consumer Access Services, however, are not offered by regulated health care professionals or facilities, and therefore generally are not subject to these state record retention requirements. In fact, there are no clear general guidelines for how long unregulated entities should store health information on behalf of consumers.
Our Work Group does not propose a general standard for a minimum or maximum time that a Consumer Access Service or PHR should retain information in an inactive consumer account. The participants did agree, however, that Consumer Access Services:
For organizations authorized by the consumer to store information as part of a consumer data stream, the data-retention practices of Consumer Access Services should be transparent to the consumer. Such practices should be part of the notice of policies. (See CP2: Policy Notice to Consumers). Consumer Access Services and networked PHRs should develop and communicate unambiguous policies regarding the persistence of information they hold on behalf of consumers. Such policies should be based on the principles of purpose specification, use limitation, and data minimization. That is, information should be retained based on its authorized purpose(s), and not retained after such purpose(s) are completed.
For inactive accounts, preferred practices may include sending notices to the consumer, providing the consumer with the option to renew or extend the retention period, or to close out the account. Should the consumer fail to respond to such notices, there should be at least one notice shortly prior to the expiration of the data-retention period, explaining that the account will be rendered inactive as of its end date unless the consumer takes action to extend it.
To reduce the risk of re-identification of individuals, Consumer Access Services and PHRs should retain passively generated information that can be used to re-identify individuals (IP addresses, cookies, and web beacons) for shorter periods than information that is actively provided by the consumer or authorized Health Data Sources as part of a longitudinal health record. (See CT4: Limitations on Identifying Information for a more detailed discussion of this issue.)
There are two circumstances in which information held by a Consumer Access Service on behalf of a consumer may be expunged:
By expunging, we mean rendering the information inaccessible from live servers if not deleting it outright, and storing any remaining information in ways that make it unable to be reconstructed in an individually identifying manner. Because reasonable consumers are often unaware that information that they "delete" within their own applications may often persist in other data stores or caches, it is vital that the end result of the "expunging" activity be clearly stated and transparent. We anticipate that expunging will often occur in conjunction with requests to terminate an account.
Consumer Access Services should provide a mechanism for their users to request expunging (as defined above) the information held in their accounts. To the extent feasible, a Consumer Access Service should enable consumers to request expunging of information in whole or in part. Upon request by the consumer to expunge information, the Consumer Access Service should provide a mechanism for consumers to make copies of their information to the extent feasible. (See CT5: Portability of Information.) Once the consumer has confirmed a request to expunge information, the Consumer Access Service should carry out such action without delay and within a reasonable timeframe.
Consumer Access Services should provide the requesting consumer with timely notice of the status of requests for account termination and/or expunging of information. Such notice of status should clearly state the consequences and actual definition of "expunging" of information.
Regarding requests for expunging of information, the Consumer Access Service should delete the information to the extent feasible and, absent full deletion, at a minimum render the information inaccessible from live servers and take care to ensure that any retained information is stripped of personally identifying data. If there is potential for a Consumer Access Service to be sued for giving unauthorized access to a PHR, the Consumer Access Service should render the information inaccessible to others but maintain an internal copy of identifiable information for defense purposes.
Just as the initiation of a PHR account must be voluntary, so must the termination of an account be a viable consumer choice.
A Consumer Access Service must provide an easy-to-use mechanism for its users to terminate an account. Upon request of the consumer for account termination, the Consumer Access Service shall carry out such action without delay and within a reasonable timeframe.
Such mechanism should:
__________
©2008-2011, Markle Foundation
This work was originally published as part of a compendium called The Markle Connecting for Health Common Framework for Networked Personal Health Information. It is made available free of charge, but subject to the terms of a License. You may make copies of this work; however, by copying or exercising any other rights to the work, you accept and agree to be bound by the terms of the License. All copies of this work must reproduce this copyright information and notice.