Download T6: Record Locator Service: Technical Background from the Massachusetts Prototype Community
The RLS system architecture is primarily driven by the functional requirements of the health information network. Functional requirements are captured in use case models or requirements definition documents, as well as vision and mission statements describing the longer term strategy. In addition, architectures have technology drivers and need to be cognizant of constraints of the information processing environment in which the system operates and the technology platforms used to implement the architecture.
The Use Case view represents the end users view of the system, and provides insight into the business goals of the system. Use cases represent the interactions that take place between the system and its users. Use case diagrams provide a schematic view of the end-user requirements that the system expects to satisfy. Use cases do not capture all the functionality of a system, only the users’ activities with respect to the system. Also note that use case specification diagrams need to be supplemented by textual descriptions that provide details of the requirements, which are not provided in this document.
RLS is intended to serve as a key infrastructure element in a regional health information network. RLS primarily maintains an index of pointers to the network location of patient information, but not the personal health information itself. The index of pointers is akin to a ‘master patient index’ as deployed in integrated healthcare delivery networks with multiple independent clinical systems maintaining patient records.
RLS serves as a coordinating service that obviates the need for a national health identifier, by linking diverse patient records across distributed clinical data sources through probabilistic demographic matching techniques. Such a service can facilitate a federation of diverse clinical data sources to enable a consolidated view of a patient’s electronic health care records. The clinical data nomenclature includes a range of information from medical records in provider systems, dispensed drug information at pharmacy systems, to administrative and financial information in payer systems.
Various institutional models have been discussed for ownership and operation of an RLS. In the current environment, the logical organizational framework for an RLS would seem to be a regional health information organization (RHIO). RHIOs are considered key elements of the strategy for constructing an interconnected and interoperable network of networks that forms the national health information network (NHIN).
Massachusetts SHARE (Simplifying Healthcare Among Regional Entities), a regional collaborative initiative operated by the Massachusetts Health Data Consortium, may play the role of a RHIO. One of MA-SHARE’s goals is to create a sustainable community utility for clinical connectivity and data exchange. The future extension of RLS to serve as such a utility is a consideration in its architecture.
While RLS primarily supports individual caregivers by facilitating access to aggregated patient information, it may facilitate information sharing across other authorized stakeholders as well, including the patient. A longer term ‘concept of operations’ view of RLS is shown in Figure 2.
Figure 2: RLS Long term Concept of Operations
The architecturally significant use cases of RLS are shown in Figure 3. The primary end user function of RLS is to provide healthcare practitioners with pointers to clinical data stored at distributed network nodes. To establish context it useful to understand the complete usage scenario from a healthcare practitioner’s perspective, which would include subsequent retrieval of patient records. Patient records retrieval is not an RLS function, and is shown as a separate ‘clinical data exchange’ service in the use case diagram.
Actors are entities (both human and system) that interact directly with the RLS. RLS actors include:
Figure 3: RLS Prototype Use Case Diagram
Note that the core RLS function is only to locate patient records. This essentially implies providing indexing services for distributed clinical data sources, which publish patient registry events into the RLS. This separation of services is a key aspect of the CfH strategy which seeks to decouple the standards and policies relating to separate functions of the network.10
The following use cases are architecturally significant to the RLS, in that they exercise critical aspects of the system architecture:
Table 1: List of Architecturally Significant Use Cases
| Name | Description |
|---|---|
| Lookup patients |
On entry of search criteria by authenticated and authorized users, system shall retrieve a list of patients matching the search criteria entered. System shall return the list of patient records with 'locations' (or web addresses) where these records may be accessed |
| Publish patient index |
On entry of new patient records in the clinical data source (e.g. after a registration or ADT event), or upon changes to existing patient records, the clinical data source node shall transmit a set of demographic attributes and a pointer to the patient record (typically in the form of a Medical Record Number) to the patient index maintained centrally at the RLS (the community Master Patient Index, or CMPI) The RLS acknowledges receipt of the changed record information. |
| Authenticate authorized users | RLS users are authenticated as authorized network users by the clinical system to which the user is affiliated. |
| Communicate securely |
RLS and the clinical system communicate securely over the internet. Senders and receivers of messages are mutually authenticated before exchange of messages; message confidentiality and integrity are assured; and message non-repudiation is enabled for both sender and receiver |
| Log messages | All messages are logged with name of user / organization initiating the operation. Logs can be audited for information on all access to RLS patient index |
The patient lookup and patient publish use cases are both realized through messages sent securely from nodes in the health information network to the RLS requesting lookup and publish services respectively. The ‘lookup patient’ and ‘publish patient index’ use cases are realized in the manner shown in the activity diagram in Figure 4.
The swimlanes in the activity diagrams correspond to the actors shown in the use case diagram. Healthcare practitioners and clinical data sources are roles played by entities such as hospitals, physician practices, diagnostic services, payers, public health agencies etc. Thus, a provider system at a network node could play the role of a clinical data source, and also be the channel through which healthcare practitioners access the RLS.
While the core functionality of RLS is to support publishing into, and searching the CMPI, the RLS-based network would require information processing in each of the nodes interacting with the patient index to support secure, reliable and standards based communication between them. This communication function is the core of the common framework that enables the various network nodes to exchange information with the RLS and with each other. The communication functionality at these nodes share many common processing capabilities which may be encapsulated into a common technology artifact as shown in Section 4.
Figure 4: Lookup Patient and Publish Patient Index Activity Diagrams
Other functional aspects that influence the RLS architecture include:
Protection of patient privacy is a legal and regulatory requirement that is realized through system security as well as policies implemented by the RLS and the various participants in the healthcare information network. Patient and healthcare practitioner trust in the security and privacy protection features of the RLS-based network is a critical pre-requisite to its success.
Privacy protection is based on restricting network access to the data to only authorized personnel, monitoring all access to patient data to audit the operational use of the network, and implementing architectural safeguards to manage the risk of accidental or malicious spillage of data in the course of network operation.
3.4.1 Identity Management
The RLS is intended for use by large networks of healthcare enterprises, each of which may have large user end user populations. RLS must not be required to manage the network identities of all individual users. End users (healthcare practitioners) are authenticated by the enterprise to which they are affiliated and referred to RLS as authenticated principals. Identity management is a local function. Patients who use hospital / IDN patient web sites are referred to RLS as authenticated principals by the clinical systems at the hospital / IDN. RLS and all participating entities have the ability to mutually authenticate each other before exchanging data.
3.4.2 Confidentiality, Authentication, Integrity & Non-Repudiation
The RLS network architecture uses the following high level security requirements in implementing messaging as well as application data management:11
3.4.3 Patient Data Privacy
The health information network is architected on the presumption that data privacy is easier to protect locally, i.e. on the edges of the network where data are stored. Release of information from the clinical data source to healthcare practitioners is governed by policies established and maintained by the data source.
RLS, being a directory of patient record locations, is itself a source of protected health information. RLS shall publish and maintain a clear policy governing discovery of patient information in the directory. The specific rules governing sharing of RLS directory information pertaining to individual patients are created by the patient and provider at the time of the encounter and communicated to the RLS along with the message of that encounter event.
Healthcare information networks need to pay special heed to ‘sensitive’ data disclosure:
3.4.4 Consent Management
Some states require that explicit patient consent be obtained to share their medical records across the network. There are varying degrees of restrictions of privacy / consent requirement and RLS must be capable of handling this variability. The following policies have been proposed for the RLS-based health information network to manage the consent process:
The key function of the CMPI is to link patient records across different institutions, each of which maintains patient data independently and, often, inconsistently. Various algorithms are available for matching person records based on limited sets of demographic attributes, for which software implementations exist. The algorithms should match the patient attributes used as search criteria with those in the CMPI records using NYSIIS matching, digit transposition checks, etc. RLS should be capable of using integrating with a variety of patient matching software.
Two models exist for implementing the linking / matching process.
Human disambiguation of patient matching results is considered undesirable. While an interactive narrowing down of patient matches may be appropriate within a hospital setting where the degree of trust is high, this is considered unacceptable when RLS is serving as a CMPI to multiple institutions. Therefore, probabilistic matching algorithms should have their positive match threshold set high enough to reduce the percentage likelihood of false positives to negligible levels.