Section 5: How Consumers Could Be Networked Via the Common Framework

Currently available PHRs either rely on existing data silos (i.e., patient portals offering access to non-interoperable health records) or create new silos (i.e., consumer-populated, non-interoperable records). Potential large-scale benefits of PHRs are unlikely to materialize if these applications remain dependent on limited data sources.77 For PHRs to become more universally useful to consumers, they must provide a convenient and secure means of connecting to personal data and interactive services from multiple sources, and they must provide a convenient and secure means of moving the data out of the PHR as well, in whole or in part.

A number of architectural approaches could permit consumers to deliver information from disparate data sources into a PHR and vice versa. At one end of the spectrum, the PHR could rely entirely on a centralized database of personal health information. A master database at the center of the network would aggregate data from other health information systems before the information becomes accessible in the PHR. Theoretically, the consumer could then have access via one interface to the central data repository, with potentially greater efficiencies than could be provided by queries across a distributed network. The primary problems with this centralized approach are:

  1. Data management: Copying all personal health data to a single database, and keeping it all up to date, is impractical at population scale given the vast amounts of data that exist across systems.
  2. Data quality: Sending all data to a central database may magnify data quality problems (although such an effort may also reveal data problems). The centralized repository model would make error checking and data reconciliation difficult compared to a model that keeps personal health information close to the entity that creates it and knows the patient. Organizations closest to the consumer are in the best position to validate, adjudicate, or update the consumer’s data.
  3. Business case: It is implausible that any one entity can emerge to garner the trust of all health care systems and all consumers in the fragmented U.S. health care environment. A single, central database would raise questions central to trust such as who controls the data, who governs the process, what secondary uses and resale of data will be allowed, etc. A single source of control for the database would risk the shortcomings of monopolies in general: low innovation, poor customer service, and higher prices. It also limits the power of the network to grow organically and incrementally.
  4. Security and privacy: While breaches are a concern for all information holders, a centralized model poses significant risk to privacy since a single security breach could lead to a catastrophic data leak.

Centralized systems can provide valuable efficiencies and controls, and may be very appropriate at various network nodes, which should have flexibility with regard to data-storage solutions for the information that they each hold. If centralization is the only model by which health information can be shared across disparate entities, however, there is a high risk that many entities will not participate.

The polar opposite of the centralized architecture is an entirely peer-to-peer network. Under this model, a consumer would have to create and manage separate data streams between her PHR and each system that holds her data. The primary problems with the completely decentralized approach are in many ways the mirror image of the problems of absolute centralization:

  1. Data management: If each consumer is expected to aggregate her data, she will become both her own registrar and her own system administrator. This burden will be too much for the majority of consumers.
  2. Data quality: Clinical data comes in both highly structured and very unstructured forms. The consumer would be responsible for managing these disparate forms of data—again, a task too challenging for most consumers.
  3. Business case: Each person would pay for (or choose a sponsorship model for) a PHR, but the system would be highly fragmented and create few economies of scale.
  4. Security and privacy: The security risk would be multiplied across many servers with varying levels of technical support and policy compliance. However, the breach of any given source of data would be more limited, reducing the potential for catastrophic data disclosures.

The pure point-to-point approach would place too much burden on the consumer to establish electronic transaction relationships with all of her health care services. It also would be cumbersome and pose high risks for each of the consumer’s data sources, given the current lack of standards for clinical information or of a trusted mechanism to authenticate each consumer. Further, providers would be less likely to access and use the consumer’s data if they were confronted with a hodgepodge of information aggregated from a series of unstructured point-to-point transactions.

How Could Consumers Aggregate Their Data?

Creation of centralized data repositories should not be an architectural requirement for data sharing, however, data aggregation at the level of the consumer could be very beneficial, for all of the reasons cited in the Opportunity Analysis in the Current Health Care Landscape section of this paper. How, then, can the individual aggregate her health data without relying upon a single repository at the center of the network or learning to manage a completely peer-to-peer model?

Any practical strategy for networking PHRs must avoid the negative consequences of these two extremes while satisfying the consumer- and patient-focused principles discussed in Values and Principles.

The Common Framework vision of a federated, decentralized network of SNOs was created to meet this core requirement. Under the Common Framework, authorized clinicians are able to query the network (e.g., request an index of the locations of a patient’s records) on the basis of their organization’s membership in a SNO. To establish a chain of trust, the participating SNOs must have common understandings and expectations, such as how to authenticate and authorize clinicians to use the network and how to log their actions.

Consumers also need a chain of trust to interconnect across networks. Yet they represent a greater challenge than clinicians for authentication, authorization, liability, and security. There is no commonly accepted set of practices today to provide credentials to consumers for health information exchange across different systems and data repositories. It is reasonable to expect that consumer applications could become more easily “networked” if such a set of common practices existed—that is, if some type of enforceable arrangement required all participants to operate under a common set of policies and agreements to mitigate risks such as misidentification or identity theft.

In the Markle Connecting for Health model, a network of interconnected SNOs is viewed as the most flexible and practical means to untether applications from data silos, as well as to enforce a common set of rules among participants. To integrate PHRs into the NHIN, we assume that the same model for connecting users—a chain of trust, brokered by an ISB that can talk to other entities in the system—must be available to patients and consumers. This paper considers the functions and requirements of an entity that provides consumers with access to the nationwide network of SNOs.

Consumer Access Services Could Act as Intermediaries

We start with three assumptions about how consumers could gain access to their data in the future. The first is that there will be services acting on the consumers’ behalf as aggregators of personal health information. Other kinds of networked services with many sources of data, from e-mail to online bill paying to airline booking sites, aggregate data on behalf of the user. It may become technically possible for the consumer to access her health data (via a personal computer) directly from the hospitals, labs, and other organizations that hold it. However, even in such a scenario, many services will arise to hold and manage the data on the consumer's behalf. Issues of backup, remote access, and economies of scale are in fact already driving the creation of these sorts of services. (Some models may offer storage services of all of the consumer’s data; others may emerge simply as gateways for access without actually storing the data. Ideally, consumers would choose which aggregation model best serves them.)

The second assumption is that there will be services that issue identity and authentication credentials to the consumer and pass those credentials or proof of authentication to other organizations in the NHIN, on the consumer’s behalf. Today, we have no generally accepted methods or policies for initially proving the identity of each individual for the issuance of online credentials based on that identification, nor for the initial and repeated authentication of that individual’s identity in an online environment. In a nationwide health information network, those who hold personal health data will need to be confident that the person to whom they transmit data is indeed who she claims to be. Common, reliable policies for initial proofing and repeated verification of identity will be essential functions of these intermediary services. (Although a complex set of issues surround identity, authentication, and authorization, we will group all of these issues under the label “authentication” for the rest of this document.)

Given the high cost of the initial consumer identification and the low cost of the subsequent authentications, economies of scale will drive the creation and growth of these functions. These intermediary services would be contractually obligated to comply with the rules governing participation in the network. Likewise, they would be expected to enforce those rules in the event of any violation by one of their authorized users (and to successfully exclude unauthorized users). By the same logic, the entities that issue identity credentials to individual consumers must have the organizational standing to enforce nationwide policies within their network.

Third, we assume that the aggregation and authentication functions will be combined. While aggregation and authentication could be offered separately, the economic logic driving the creation of the services will also drive their combination. As a result, competing services would act as proxies for many consumers, potentially millions at a time, holding both their authentication tokens and their data. These authentication/aggregation service providers would not necessarily be covered entities under HIPAA. For the rest of this document, we will assume that authentication and aggregation functions will be offered in tandem by entities we will call “Consumer Access Services.” We will also assume that the interaction between Consumer Access Services and other entities in the NHIN will use the service-oriented architecture of the Common Framework, including both SOAP messages and message brokering by Inter-SNO Bridges.

Following the diagram below, such a combined authenticating and aggregating service would perform key NHIN functions including, at a minimum, authenticating individual users, providing an ISB interface to bridge between those users and the rest of the NHIN, and aggregating information into PHRs on those users’ behalf.

A number of entities may be interested in offering these combined services to enable consumer access to the NHIN, including the following examples:

  • Provider organizations could strengthen their role as primary care providers and care coordinators by accessing all of a patient's data when authorized and playing the role of interpreter and coach.
  • Health insurance plans and government programs (e.g., Medicare, Medicaid, VA) could apply their data analytic- and decision support-capabilities to the clinically rich patient data available across the network and compete on their ability to deploy beneficial interventions based on that analytic intelligence.
  • Pharmacy services (i.e., pharmacy benefit managers, retail pharmacies, clearinghouses) could offer new services to attract consumers.
  • Application vendors could benefit from a more efficient marketing and distribution environment by offering their products to a range of Consumer Access Service suppliers with large populations of consumers.
  • Affinity and patient advocacy groups could create their own intermediary services to help members select and use appropriate products, while using aggregate data as a platform for improving health and advocating for shared concerns.
  • Employers could steer employees toward consumer access services that allow secure access to personal health information and other benefits.
  • Web portals and other non-traditional health care players could enter the health care space, both leveraging their brand credibility and gaining appropriate access to data that the consumer wants them to have without negotiating separate access agreements with each trading partner.
  • Regional Health Information Organizations (RHIOs) could offer services to connect consumers.

Markle Connecting for Health wishes to enable consumers to aggregate and manage their health care data while protecting them against "silo-ization" (the difficulty or inability to move their personal data easily from one source to another, especially data they may have added to their own records) and against the misuse or loss of personal data. Two key questions will need to be addressed:

1. What qualifications must a Consumer Access Service possess?

One broad answer could be: “Only current participants in the health care system would be allowed to offer consumers access to their data.” This restriction would assure that all those offering consumer access are already covered entities under HIPAA. An alternative answer could be: “Any organization that ensures accurate authentication and accountable handling of consumer data would be allowed to act as a Consumer Access Service.” One possible middle ground would be to insist contractually that all Consumer Access Services abide by HIPAA regulations, regardless of their status as a covered entity.

2. What policies, contracts, and other governing mechanisms should be applied to these services?

Consumer Access Services must be trusted partners of every other SNO and NHIN participant. These organizational partners must be confident that the entity to which they pass personal health information will handle it properly, and only share it with the intended and authenticated user. What sorts of contracts, standards support, and other mechanisms of governance would constitute a sufficient chain of trust to enable Consumer Access Services to participate fully in the NHIN?

One set of issues involves identification and authorization of the patient, including, but not limited to:

  • Minimum standards of original proofing.
  • Minimum procedures for authentication.
  • "Levels of sensitivity" authentication methods (stronger authentication for more sensitive data) and how those levels are established.
  • Bonded access to ensure some sort of penalty for misuse by third parties.
  • Co-issuance of credentials across the network.
  • Contracts that specify responsibilities and liabilities.

Another set of issues is related to access, including, but not limited to:

  • Whether the consumer must be offered a store-and-forward capability (like e-mail).
  • Whether the consumer must be offered an encrypted cache (to secure the data on the server).
  • Whether the consumer must be asked for consent for secondary uses of the data, and what constitutes “consent.”
  • Whether the consumer must have access to an audit trail that tracks every time her data is viewed or used by someone else.
  • Whether the consumer must have the right to get a full copy of her data in an appropriate format.

These issues should be resolved by a process that maximizes the value of these intermediary services for the consumer while limiting the risk of misuse of that data by other parties (including the Consumer Access Services themselves.)

Public policy must make it possible for each person to access personal health information regardless of where it was originally acquired and where it is now maintained. In solving a problem like authentication, the NHIN needs to make sure that every American has an opportunity to gain the necessary credentials and take advantage of the information channels that exist, without being subservient to any particular gatekeeper.