Office of the National Coordinator for Health Information Technology; American Health Information Community Confidentiality, Privacy, and Security Workgroup Meeting, 54283-54284 [06-7657]

Download as PDF Federal Register / Vol. 71, No. 178 / Thursday, September 14, 2006 / Notices Sang Min, Chun, President (Qualifying Individual). Safe Harbor Logistics, Inc. , 5506 Fountain Bridge Lane, Houston, TX 77069. Officers: Marc J. Lawrence, President (Qualifying Individual), Melinda S. Lawrence, Director. Non-Vessel-Operating Common Carrier and Ocean Freight Forwarder Transportation Intermediary Applicants MBM International Logistics, LLC, 650 Atlanta South Parkway, Atlanta, GA 30349. Officers: Harold Hagans, Vice President (Qualifying Individual), Xiao Yan Mers, President. Globe Shipping, Inc., 820 S. Garfield Ave., #202, Alhambra, CA 91801. Officers: Eric Qian, CEO (Qualifying Individual), Meili Ho, Secretary. Marserve Inc., 15421 Vantage Pkwy West, #116, Houston, TX 77032. Officers: Michael Henley, Vice President (Qualifying Individual, Einar Eikrem, President. Ocean Freight Forwarder—Ocean Transportation Intermediary Applicants Infinity Logistics LLC, 100 N, Charles St., Suite 1200, Baltimore, MD 21201. Officers: Marjorie Shapiro, President (Qualifying Individual), James Shapiro, Vice President. T & T Shipping Services of New York Inc., 820 Glenmore Avenue, Brooklyn, NY 11208. Officers: Patricia Williams, Vice President (Qualifying Individual), Patrick Turner, President. Dated: September 8, 2006. Karen V. Gregory, Assistant Secretary. [FR Doc. E6–15217 Filed 9–13–06; 8:45 am] BILLING CODE 6730–01–P FEDERAL RESERVE SYSTEM rwilkins on PROD1PC63 with NOTICES Change in Bank Control Notices; Acquisition of Shares of Bank or Bank Holding Companies The notification listed below have applied under the Change in Bank Control Act (12 U.S.C. 1817(j)) and § 225.41 of the Board’s Regulation Y (12 CFR 225.41) to acquire a bank or bank holding company. The factors that are considered in acting on the notices are set forth in paragraph 7 of the Act (12 U.S.C. 1817(j)(7)). The notices are available for immediate inspection at the Federal Reserve Bank indicated. The notices also will be available for inspection at the office of the Board of Governors. Interested persons may express their views in writing to the Reserve Bank VerDate Aug<31>2005 20:23 Sep 13, 2006 Jkt 208001 indicated for that notice or to the offices of the Board of Governors. Comments must be received not later than September 29, 2006. A. Federal Reserve Bank of Kansas City (Donna J. Ward, Assistant Vice President) 925 Grand Avenue, Kansas City, Missouri 64198–0001: 1. Steve Burrage, Antlers, Oklahoma; as co–trustee of the John L. Massey 2003 Family Trusts, to acquire voting shares of Durant Bancorp, Inc., and thereby indirectly acquire voting shares of First United Bank & Trust Company, both in Durant, Oklahoma. Board of Governors of the Federal Reserve System, September 11, 2006. Robert deV. Frierson, Deputy Secretary of the Board. [FR Doc. E6–15243 Filed 9–13–06; 8:45 am] BILLING CODE 6210–01–S DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the National Coordinator for Health Information Technology; American Health Information Community Confidentiality, Privacy, and Security Workgroup Meeting ACTION: Announcement of meeting. SUMMARY: This notice announces the second meeting of the American Health Information Community (‘‘the Community’’) Confidentiality, Privacy, and Security Workgroup in accordance with the Federal Advisory Committee Act (Pub. L. No. 92–463, 5 U.S.C., App.) DATES: September 29, 2006 from 10 a.m. to 4:30 p.m. Place: Hubert H. Humphrey Building (200 Independence Avenue, SW., Washington, DC 20201), Conference room 800 (you will need a photo ID to enter a Federal building). Status: Open. Purpose: At this meeting, the Community Confidentiality, Privacy, and Security Workgroup will receive information on identity proofing and user authentication as it relates to the breakthroughs currently being discussed by the Community’s Consumer Empowerment, Chronic Care, and Electronic Health Record Workgroups. The meeting will be conducted in hearing format, and the Workgroup will invite representatives who can provide information relevant to identity proofing and user authentication as it relates to the breakthroughs currently being discussed by the Community’s Consumer Empowerment, Chronic Care, and Electronic Health Record Workgroups. The format for the meeting PO 00000 Frm 00021 Fmt 4703 Sfmt 4703 54283 will include multiple invited panels and time for questions and discussion. The meeting will include a time period during which members of the public may deliver brief (3 minutes or less) oral public comment. Slots for oral comments by the public will be filled on the day of the meeting as time permits. To submit comments via e-mail, please send them to Michele.Rollins@hhs.gov (to ensure that your e-mail is received and appropriately filed, we ask that your explicitly put ‘‘CPS Public Comment’’ in the subject line of your e-mail) or mail your comments to Michele Rollins, Office of the National Coordinator (ONC), 330 C Street, SW., Suite 4090, Washington, DC 20201. SUPPLEMENTARY INFORMATION: The Community’s Confidentiality, Privacy, and Security (CPS) Workgroup will undertake steps to evaluate instances where health information technology (health IT) has shifted the CPS paradigm, as well as where policy (due to evolving technology) have become unclear or allow for varied interpretation. The first two issues before the CPS workgroup (identity proofing and user authentication) were chosen because of their foundational importance to any security initiative. Inextricably linked, both issues need discussion in order to determine how authorized entry is governed to a new technology product, service, or infrastructure. In typical workflows, identity proofing and user authentication are the first of many processes completed in health care environments, followed shortly thereafter by other more complex activities such as access control, data management, information matching and transmission, and information assurance (data integrity, business continuity, etc.). There is no one solution for identity proofing and user authentication. As health IT evolves, we expect that methods for identity proofing and user authentication will evolve as well. Certain types of health IT products may require more stringent methods while others may not, and understanding these tradeoffs will be critical to determining CPS policies. Deciding how to prove (with some degree of confidence) that someone is who they claim to be, followed by a repeatable authentication process, are necessary steps to ensure that an authorized person or entity can access a health IT product or service in a private and secure manner. In an effort to inform members of the public responding to the questions posed for testimony, we are defining E:\FR\FM\14SEN1.SGM 14SEN1 rwilkins on PROD1PC63 with NOTICES 54284 Federal Register / Vol. 71, No. 178 / Thursday, September 14, 2006 / Notices identity proofing and user authentication. For the purposes of the CPS hearing, identify proofing should be understood to mean the process of providing sufficient information (e.g., identity history, credentials, and documents) to correctly and accurately verify and establish an identity to be used in an electronic environment (e.g., over the Internet). For many everyday processes such as applying for a passport or driver’s license, identity proofing takes place. To be granted the rights associated with a passport or driver’s license, one first needs to provide documents to prove one’s identity (e.g., birth certificate). This same principal exists to control access to electronic systems, and it is the intent of this hearing to discuss the types of identity proofing used or recommended to gain access to certain health IT products or services. For the purposes of the CPS hearing, user authentication should be understood to mean the process of reliably verifying a claimed or presented identity, often used as way to grant authorized access to data, resources, and other network services. User authentication takes place after an identity has been successfully proofed (verified by the appropriate authority) and a credential representing that proofed identity has been assigned to an individual. This does not mean the assignment of a unique identifier, but rather it refers to the method any system uses (in a unique way) to differentiate its users (e.g., a separate username) and challenge the user’s ability to prove that they are who they claim to be (e.g., knowledge of a password associated with the username). While responding to the questions below, it is recommended that each response identify (1) The risks and benefits associated with a particular identity proofing and/or user authentication method; (2) the potential costs and/or barriers associated with the method’s implementation; and (3) if feasible, quantify the risks, benefits, costs, or barriers discussed in parts 1 and 2, with respect to a health care consumer, provider, other entity, or all. Responses should be particularly focused on the Community’s breakthroughs (pre-populated and consumer-directed medication history and registration summary as part of a personal health record (PHR), access to current and historical laboratory results and interpretations in an electronic health record (EHR), and secure messages between patients and their clinicians). Where possible, please provide references to any peer reviewed VerDate Aug<31>2005 20:23 Sep 13, 2006 Jkt 208001 literature that has informed your response. 1. Does an in-person identity proofing process provide greater benefit than automated, on-line processes, or vice-versa? Please explain. 2. Identify and particular concerns regarding the type of information collected for identity proofing or the storage of such information. 3. Should there be different identity proofing and user authentication processes for: a. A patient versus a clinician. If yes, please explain and identify the scenario; b. The primary user of a PHR versus a proxy for that user? 4. Are there other industry policies and practices related to identity proofing and user authentication and could be used successfully in any of the Community identified breakthroughs (see above)? If so, please described these policies and specify how these could be implemented in a way that would minimize the risks and maximize the benefits as well as how they would compare to alternative methods in terms of risks, benefits and feasibility of implementation. 5. What is the appropriate balance of access to medical information in electronic form (through the use of stronger identity proofing and user authentication) against the privacy concerns of the consumer/patient? If possible, please discuss comparable programs/efforts in the past that have been successful in doing this? 6. What/how do you see the HHS’s role, if any, in establishing guidelines for the health care industry with respect to identity proofing and user authentication? Or should the industry self-police in this area? 7. If private industry EHR or PHR services were to import data from Federal agencies (who are required either by statute or policy to protect data in certain ways), would it be reasonable to expect that the EHR or PHR service provided would comply with Federal information security practices? 8. Should the health care industry adopt the concept of multiple assurance levels when performing identity proofing and user authentication functions, similar to what OMB has defined for the Federal Government in OMB Memorandum M–04–04? When responding to this question, please cite, if possible other models that may exist specifically for health care? 9. Based on your experience (personal/ organizational) discuss how identity proofing and user authentication are currently addressed in the Personal Health Record (PHR) market from a technical, policy, and implementation perspective. Please ensure that your answers identify: a. How the type of PHR (i.e., who provides/ sponsors the PHR) could impact the identity proofing and user authentication method chosen; b. Who is capable of providing data to the PHR; c. The potential impact the type of data (which may vary in levels of perceived sensitivity, e.g., a medication history that lists a drug for an ear infection versus a drug PO 00000 Frm 00022 Fmt 4703 Sfmt 4703 for HIV) could have on the identity proofing and user authentication method chose; and d. How data is entered into the PHR, for example, by a health care consumer, or from a provider through a ‘‘push model’’ where data is automatically sent to the PHR without a request by the consumer. 10. Based on your experience (personal/ organizational) with EHR technology, that can at a minimum provide access to current and historical laboratory results and interpretations, should identify proofing and user authentication methodologies (technical, policy, and implementation) differentiate based upon: a. The reception method of the data i. For example: Accessing a laboratory’s secure Web site for results and typing them into a patient’s EHR vs. automatic population from the lab to the EHR; and b. The interconnectivity of the EHR i. For example: A doctor in a large health care system may be able to query another provider’s EHR for data as opposed to querying the lab directly. Written testimony submitted by the public is not required to address all of the questions listed above, and answers to any or all of the questions will be accepted so long as they comply with the following testimony guidelines. Persons wishing to submit written testimony (which should not exceed eight double-spaced typewritten pages) should endeavor to submit it by September 29, 2006. If you have special needs for the meeting or require further assistance, please contact (202) 690–7151 and reference the CPS meeting. The meeting will be available via Web cast at www.eventcenterlive.com/cfmx/ ec/login/login1.cfm?BID=67 [Room Number: 8285166]. Judith Sparrow, Director, American Health Information Community, Office of Programs and Coordination, Office of the National Coordinator for Health Information Technology. [FR Doc. 06–7657 Filed 9–13–06; 8:45 am] BILLING CODE 4150–24–M DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [60Day-06–06BO] Proposed Data Collections Submitted for Public Comment and Recommendations In compliance with the requirement of Section 3506(c)(2)(A) of the Paperwork Reduction Act of 1995 for opportunity for public comment on proposed data collection projects, the Centers for Disease Control and E:\FR\FM\14SEN1.SGM 14SEN1

Agencies

[Federal Register Volume 71, Number 178 (Thursday, September 14, 2006)]
[Notices]
[Pages 54283-54284]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-7657]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES


Office of the National Coordinator for Health Information 
Technology; American Health Information Community Confidentiality, 
Privacy, and Security Workgroup Meeting

ACTION: Announcement of meeting.

-----------------------------------------------------------------------

SUMMARY: This notice announces the second meeting of the American 
Health Information Community (``the Community'') Confidentiality, 
Privacy, and Security Workgroup in accordance with the Federal Advisory 
Committee Act (Pub. L. No. 92-463, 5 U.S.C., App.)

DATES: September 29, 2006 from 10 a.m. to 4:30 p.m.
    Place: Hubert H. Humphrey Building (200 Independence Avenue, SW., 
Washington, DC 20201), Conference room 800 (you will need a photo ID to 
enter a Federal building).
    Status: Open.
    Purpose: At this meeting, the Community Confidentiality, Privacy, 
and Security Workgroup will receive information on identity proofing 
and user authentication as it relates to the breakthroughs currently 
being discussed by the Community's Consumer Empowerment, Chronic Care, 
and Electronic Health Record Workgroups.
    The meeting will be conducted in hearing format, and the Workgroup 
will invite representatives who can provide information relevant to 
identity proofing and user authentication as it relates to the 
breakthroughs currently being discussed by the Community's Consumer 
Empowerment, Chronic Care, and Electronic Health Record Workgroups. The 
format for the meeting will include multiple invited panels and time 
for questions and discussion. The meeting will include a time period 
during which members of the public may deliver brief (3 minutes or 
less) oral public comment. Slots for oral comments by the public will 
be filled on the day of the meeting as time permits. To submit comments 
via e-mail, please send them to Michele.Rollins@hhs.gov (to ensure that 
your e-mail is received and appropriately filed, we ask that your 
explicitly put ``CPS Public Comment'' in the subject line of your e-
mail) or mail your comments to Michele Rollins, Office of the National 
Coordinator (ONC), 330 C Street, SW., Suite 4090, Washington, DC 20201.

SUPPLEMENTARY INFORMATION: The Community's Confidentiality, Privacy, 
and Security (CPS) Workgroup will undertake steps to evaluate instances 
where health information technology (health IT) has shifted the CPS 
paradigm, as well as where policy (due to evolving technology) have 
become unclear or allow for varied interpretation.
    The first two issues before the CPS workgroup (identity proofing 
and user authentication) were chosen because of their foundational 
importance to any security initiative. Inextricably linked, both issues 
need discussion in order to determine how authorized entry is governed 
to a new technology product, service, or infrastructure. In typical 
workflows, identity proofing and user authentication are the first of 
many processes completed in health care environments, followed shortly 
thereafter by other more complex activities such as access control, 
data management, information matching and transmission, and information 
assurance (data integrity, business continuity, etc.).
    There is no one solution for identity proofing and user 
authentication. As health IT evolves, we expect that methods for 
identity proofing and user authentication will evolve as well. Certain 
types of health IT products may require more stringent methods while 
others may not, and understanding these tradeoffs will be critical to 
determining CPS policies. Deciding how to prove (with some degree of 
confidence) that someone is who they claim to be, followed by a 
repeatable authentication process, are necessary steps to ensure that 
an authorized person or entity can access a health IT product or 
service in a private and secure manner.
    In an effort to inform members of the public responding to the 
questions posed for testimony, we are defining

[[Page 54284]]

identity proofing and user authentication. For the purposes of the CPS 
hearing, identify proofing should be understood to mean the process of 
providing sufficient information (e.g., identity history, credentials, 
and documents) to correctly and accurately verify and establish an 
identity to be used in an electronic environment (e.g., over the 
Internet). For many everyday processes such as applying for a passport 
or driver's license, identity proofing takes place. To be granted the 
rights associated with a passport or driver's license, one first needs 
to provide documents to prove one's identity (e.g., birth certificate). 
This same principal exists to control access to electronic systems, and 
it is the intent of this hearing to discuss the types of identity 
proofing used or recommended to gain access to certain health IT 
products or services.
    For the purposes of the CPS hearing, user authentication should be 
understood to mean the process of reliably verifying a claimed or 
presented identity, often used as way to grant authorized access to 
data, resources, and other network services. User authentication takes 
place after an identity has been successfully proofed (verified by the 
appropriate authority) and a credential representing that proofed 
identity has been assigned to an individual. This does not mean the 
assignment of a unique identifier, but rather it refers to the method 
any system uses (in a unique way) to differentiate its users (e.g., a 
separate username) and challenge the user's ability to prove that they 
are who they claim to be (e.g., knowledge of a password associated with 
the username).
    While responding to the questions below, it is recommended that 
each response identify (1) The risks and benefits associated with a 
particular identity proofing and/or user authentication method; (2) the 
potential costs and/or barriers associated with the method's 
implementation; and (3) if feasible, quantify the risks, benefits, 
costs, or barriers discussed in parts 1 and 2, with respect to a health 
care consumer, provider, other entity, or all. Responses should be 
particularly focused on the Community's breakthroughs (pre-populated 
and consumer-directed medication history and registration summary as 
part of a personal health record (PHR), access to current and 
historical laboratory results and interpretations in an electronic 
health record (EHR), and secure messages between patients and their 
clinicians). Where possible, please provide references to any peer 
reviewed literature that has informed your response.

    1. Does an in-person identity proofing process provide greater 
benefit than automated, on-line processes, or vice-versa? Please 
explain.
    2. Identify and particular concerns regarding the type of 
information collected for identity proofing or the storage of such 
information.
    3. Should there be different identity proofing and user 
authentication processes for:
    a. A patient versus a clinician. If yes, please explain and 
identify the scenario;
    b. The primary user of a PHR versus a proxy for that user?
    4. Are there other industry policies and practices related to 
identity proofing and user authentication and could be used 
successfully in any of the Community identified breakthroughs (see 
above)? If so, please described these policies and specify how these 
could be implemented in a way that would minimize the risks and 
maximize the benefits as well as how they would compare to 
alternative methods in terms of risks, benefits and feasibility of 
implementation.
    5. What is the appropriate balance of access to medical 
information in electronic form (through the use of stronger identity 
proofing and user authentication) against the privacy concerns of 
the consumer/patient? If possible, please discuss comparable 
programs/efforts in the past that have been successful in doing 
this?
    6. What/how do you see the HHS's role, if any, in establishing 
guidelines for the health care industry with respect to identity 
proofing and user authentication? Or should the industry self-police 
in this area?
    7. If private industry EHR or PHR services were to import data 
from Federal agencies (who are required either by statute or policy 
to protect data in certain ways), would it be reasonable to expect 
that the EHR or PHR service provided would comply with Federal 
information security practices?
    8. Should the health care industry adopt the concept of multiple 
assurance levels when performing identity proofing and user 
authentication functions, similar to what OMB has defined for the 
Federal Government in OMB Memorandum M-04-04? When responding to 
this question, please cite, if possible other models that may exist 
specifically for health care?
    9. Based on your experience (personal/organizational) discuss 
how identity proofing and user authentication are currently 
addressed in the Personal Health Record (PHR) market from a 
technical, policy, and implementation perspective. Please ensure 
that your answers identify:
    a. How the type of PHR (i.e., who provides/sponsors the PHR) 
could impact the identity proofing and user authentication method 
chosen;
    b. Who is capable of providing data to the PHR;
    c. The potential impact the type of data (which may vary in 
levels of perceived sensitivity, e.g., a medication history that 
lists a drug for an ear infection versus a drug for HIV) could have 
on the identity proofing and user authentication method chose; and
    d. How data is entered into the PHR, for example, by a health 
care consumer, or from a provider through a ``push model'' where 
data is automatically sent to the PHR without a request by the 
consumer.
    10. Based on your experience (personal/organizational) with EHR 
technology, that can at a minimum provide access to current and 
historical laboratory results and interpretations, should identify 
proofing and user authentication methodologies (technical, policy, 
and implementation) differentiate based upon:
    a. The reception method of the data
    i. For example: Accessing a laboratory's secure Web site for 
results and typing them into a patient's EHR vs. automatic 
population from the lab to the EHR; and
    b. The interconnectivity of the EHR
    i. For example: A doctor in a large health care system may be 
able to query another provider's EHR for data as opposed to querying 
the lab directly.

    Written testimony submitted by the public is not required to 
address all of the questions listed above, and answers to any or all of 
the questions will be accepted so long as they comply with the 
following testimony guidelines. Persons wishing to submit written 
testimony (which should not exceed eight double-spaced typewritten 
pages) should endeavor to submit it by September 29, 2006.
    If you have special needs for the meeting or require further 
assistance, please contact (202) 690-7151 and reference the CPS 
meeting.
    The meeting will be available via Web cast at 
www.eventcenterlive.com/cfmx/ec/login/login1.cfm?BID=67 [Room Number: 
8285166].

Judith Sparrow,
Director, American Health Information Community, Office of Programs and 
Coordination, Office of the National Coordinator for Health Information 
Technology.
[FR Doc. 06-7657 Filed 9-13-06; 8:45 am]
BILLING CODE 4150-24-M
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.