Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks

https://doi.org/10.1016/j.ijmedinf.2006.09.014Get rights and content

Abstract

Background

A system ensuring tight control access is used since 5 years at the University Geneva Hospitals (HUG) over a four campuses health care system with ambulatory care settings behaving like a small community care network. Access to identified clinical information is limited to care providers that have a therapeutic relationship with the patient and to those data needed for that relation. The same policy applies to administrative or scientific research accesses. This paper presents how the HUG met the challenging goal of protecting patient privacy within regulatory limits while keeping the system operational in terms of use and management.

Solution

The main characteristics of the system are: (a) an institution-wide policy for access rights to the computerized patient record; (b) an institutional management of the contracts of the collaborators; (c) access profiles based on application-independent, fine-grained access rights; (d) a decentralized attribution of profession-specific access profiles; (e) a complete, centralized log of all accesses to the clinical information system; and (f) a decentralized verification of the accesses. Many of these characteristics can be maintained when evolving towards a trans-institutional computerized patient record, but new constraints need to be taken into account.

Introduction

Privacy, accesses rights management, security are discussed since many years in the field of medical informatics [1]. Meanwhile, computerized patient records (CPR) evolve towards collaborative tools for care providers and patients in an ever-increasing networked environment, highlighting the need for complex rights managements. At the hospital level already, the CPR is an important collaborative tool shared among many different care providers and administrative or scientific services to fulfil all needs. Providing a comprehensive, fast and simple access management system that is compatible with the daily operational work while respecting the privacy of patients is a challenging goal [2], [3].

The Geneva University Hospitals (HUG) is a consortium of hospitals in four campuses and more than 30 ambulatory facilities in the state, comprising more than 2000 beds, 5000 care providers, over 45,000 admissions and 750,000 outpatients visits each year. It covers the whole range of in- and outpatient care, from primary to tertiary facilities. The HUG is the major public healthcare facility in the Geneva region and the adjacent France. The in-house developed CPR is used in the complete HUG and runs on more than 4500 PCs. More than 20,000 records are open every day, 7 days a week, around the clock with never less than 200 records accessed each hour. The system is used by around 3000 care providers from all functions, including physicians, nurses, medical secretaries, social care providers, physiotherapists, nutritionists, music therapists, etc. In addition, the CPR is used for many other purposes than care, such as admission clerks, billing, resource management, epidemiology, clinical research, among others. In order to ensure the best protection to patient's privacy while ensuring the best operational model and respecting legal constraints, we developed a complete process for right managements. This process is based on four pillars:

  • (a)

    Institutional committee in charge of defining and validating the concepts and profiles of rights.

  • (b)

    A standardized and unified computerized access management allowing centralization of the definition of the profiles and decentralization of the attribution to users.

  • (c)

    A standardized track&trace computerized system in charge of tracking and consolidating all access to identified data that allows all accesses to be reviewed.

  • (d)

    Institutional procedures to review, validate or sanction inappropriate accesses.

In addition, the track&trace utility produces a list of all users that accessed a record which is available directly in the record and, therefore, visible to the patient.

Section snippets

The conceptual framework

Fundamentally, it has been agreed that (i) accesses to the patient record must fit within a therapeutic relationship or one associated to (such as medical clerks) and (ii) the extent to which this is possible will vary according to the needs, i.e., according to the role of the user at the time of the access. The following points are the major components on which the system is built.

Organisational issues

In order to gain access to identified clinical information, the user must fulfil the following set of requirements:

  • -

    have a valid contract with the institution;

  • -

    have a profile attributed within the last 12 months;

  • -

    the profile must be active at least in one domain;

  • -

    the patient whose data will be accessed must be in the same domain at the same time.

The information that can be accessed and the actions that can be taken are under the control of the atomic rights included in the profile.

A user can have

Tracking accesses

In addition to a strict access policy restricting who can access what, and a mandatory review of all accesses made using the “break the glass” escape mechanism, all accesses to any clinical data from any application is tracked centrally and will is visible, in real-time, in the patient record, which is available to care providers and the patient itself. This is a first important step towards giving the patient control over his own data, and especially his medical data.

Technical aspects

The system is a Java, component-based architecture made of two major groups of components: one dealing with a priori authorisation and access management, and another dealing with a posteriori surveillance, based on access logs. For both groups, there are business components and user-interface components. The business components communicate with HTTP/XML protocols [4], including Simple Object Access Protocol (SOAP), but do also include technical interface to third party applications. As a

Evolving towards a trans-institutional network

The HUG's CPR can be considered as an institutional network. Moving towards a trans-institutional network, as planned and designed in the “e-toile” community health information network [5], will require several adjustments to the current model (Fig. 3).

Firstly, the therapeutic relationship will be materialized by the physical co-existence of the professional's card and the patient's card. The access profile of the professional will describe the default behaviour of the system, but the patient

Conclusion

The HUG have developed a framework covering organisational issues, regulatory constraints and technical solutions to ensure a proper level of privacy protection while ensuring a manageable operational load for handling right accesses to identified clinical information. The system, operational for 5 years, has been made mandatory for all in-house and third party application, allowing a unique concept of protection to be implemented. Managing accesses in health is a complex challenge: it implies

References (5)

  • F.H. Roger France

    Security of the electronic health record

    Stud. Health Technol. Inform.

    (1997)
  • J.R. Scherrer

    The problems related to confidentiality and effectiveness of health care

    Eff. Health Care

    (1983)
There are more references available in the full text version of this article.

Cited by (33)

  • Security and privacy in electronic health records: A systematic literature review

    2013, Journal of Biomedical Informatics
    Citation Excerpt :

    Two certificates are employed: a security processor certificate that contains a key-pair which is used for the cryptographic authentication of the machine and is bound to its unique hardware features, and a separate certificate called a rights management account certificate which contains a key-pair used for the authentication of the user and is bound to the user’s unique identifier and email address. Other access mechanisms presented in the studies are: username/password [5,27,32,35,50,62,74], login/password combined with a digital certificate [27,62,63,67,68], password and PIN [51–53], a smart card and its PIN [32,54–56,67,75], a smart card, its PIN and a fingerprint [36] and access policy spaces [40]. Daglish and Archer [61] use a username and a key by employing one of the following methods: (1) physical location as part of authentication; (2) the use of the Web and a security certificate of a trusted organization.

  • An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow

    2012, Journal of Biomedical Informatics
    Citation Excerpt :

    Information access is an essential requirement to biomedical research, clinical education, and patient care [1–7].

View all citing articles on Scopus
View full text